New type of .NET obfuscator that actually hide IL codes, unlike any other old fashioned obfuscators or assembly encrypters. 'Dynamic Code Displacing' replaces your codes with delegates and dynamic methods which are generated at run-time as need be.
Archangel Cloak .NET - Code Displacer
.NET Dynamic Code Displacing Obfuscator
Dynamic Code Displacing takes you beyond Obfuscation
read on to discover how this can help you protect your code
Dynamic Code Displacing is a new type of .NET obfuscation that actually hide IL codes, , unlike any other old fashioned obfuscators or assembly encrypters . This is the ultimate tool in anti-reflection and CIL-Anti-Debugging. Dynamic Code Displacing is the software protection solution that can completely stop any attempt to reverse engineer your programs. It will protect your codes from any reflectors, disassemblers, decompilers, and even IL debuggers.
.NET framework comes with comprehensive set of dynamic coding functionalities, hence Dynamic Code Displacing can be properly implemented on this framework. Unlike other similar products we do not decrypt and create hard coded methods at run-time, since this type of method can still be exposed to Process Dumper/Reflector. 'Dynamic Code Displacing' hides IL codes through dynamic assembly, dynamic class, and dynamic methods, ie:
IL codes are removed from methods/properties and replaced with uninitialized delegates.
These delegates are just empty place holders which don't have any codes associated with them (set to null).
The extracted codes are then encrypted and safely store away, so there are no IL codes to be reflected by any reflectors. These IL codes are encrypted using AES cryptography algorithm.
At run-time these codes are retrieved, decrypt, and dynamically convert to dynamic methods and then associated with the delegates (place holder) according to the specified mode :
Preload : dynamic methods are created and assigned to the associated delegates at the start of application.
LoadOnFirstCalled : dynamic method will be created and assigned to the associated delegate when the method is called for the first time.
LoadAndDiscard : dynamic method is created and assigned to the associated delegate every time the method is called and then discarded after the method return to the caller.
These dynamic methods cannot be reflected, disassemble, or decompiled.
Process Dumper/Reflector will only see the delegate declarations. It will not be able to see the underlying generated dynamic methods.
CIL Debuggers cannot track or trace directly into dynamic methods.
For extra protection, Dynamic Code Displacing can also convert obfuscated assemblies (provided that ILDASM.exe is not disabled by the obfuscator). Obfuscation alone does not provide enough protection against modern reflectors. Highly complex reflectors have ability to assign names from their functionalities, hence make it easier to understand your codes. By adding Dynamic Code Displacing on top of obfuscation, it will prevent reflectors to analyze your codes (since there is no codes to analyze). Hence obfuscated names remain properly obfuscated. Even without obfuscation, Dynamic Code Displacing alone can provide far more superior protection against reverse engineering.
'Dynamic Code Displacing' is a specialize obfuscation tool that only provides code hiding/displacing capability. It can be used in combination with other standard obfuscators if you feel that extra obfuscation is still needed. You don't need to used our obfuscator, feel free to used any of your favorite or already owned obfuscator.
Get Started with this new innovation now and you will see that the technology works well against all threats. None of your codes will be exposed to reverse engineering anymore. Don't settle for just simple obfuscation, start hiding your codes today with Dynamic Code Displacing.