Demonstrates of eight common code obfuscation techniques
obfuscation
reverse-engineering
anti-analysis
self-modifying-code
string-encryption
opaque-predicates
name-obfuscation
control-flow-obfuscation
packing-compression
virtualization-intepretation
junk-code-insertation
-
Updated
Sep 4, 2024 - Jupyter Notebook