DYAMAR Obfuscator is a unique solution allowing you to protect any Win32 application from reverse-engineering. DLL and EXE files are among supported files. The whole program code is subject to detailed analysis and turns into an analogue code that is very hard or even impossible to read. This process will help prevent cracking attempts but also stealing private or patented algorithms.
The current version of DYAMAR Obfuscator uses three basic program mutation technologies:
· Random instructions generation
· Instructions mutation
· Execution flow mutation DYAMAR Obfuscator has one more important advantage - except for standart entry points tracing it uses a unique heuristic code analyzer allowing to get deep inside the application and obfuscate the maximum program code.
After all the operations performed, the data is collected and written back into a source file in its new code section the name of which can be mentioned in the application settings. At that, special technologies are used to make the target file look like it is created by compilers that finally allows to reduce the risk of this application being detected by an antivirus as undesired or malicious.
· You get stable protection without using any undocumented Windows features.
· All your algorithms are hidden and highly mutated.
· Easy to use solution. It takes only a few clicks to protect your application.
· Your whole EXE/DLL code gets obfuscated!
· Does not hang up your applications. Saves performance!
Limitations:
· DLL Files obfuscation not supported
· Files with relocations not supported
· Advanced heuristic code detection engine not supported
· Instruction mutation not supported
· Executing flow mutation not supported
· Code coverage 10-40%