Obfuscates Native EXE/DLL Files. Mutates x86 assembly code.
DYAMAR Obfuscator is a unique solution allowing you to protect any Win32 application from reverse-engineering. DLL and EXE files are among supported files. The whole program code is subject to detailed analysis and turns into an analogue code that is very hard or even impossible to read. This process will help prevent cracking attempts but also stealing private or patented algorithms.
The current version of DYAMAR Obfuscator uses three basic program mutation technologies:
· Random instructions generation
· Instructions mutation
· Execution flow mutation DYAMAR Obfuscator has one more important advantage - except for standart entry points tracing it uses a unique heuristic code analyzer allowing to get deep inside the application and obfuscate the maximum program code.
After all the operations performed, the data is collected and written back into a source file in its new code section the name of which can be mentioned in the application settings. At that, special technologies are used to make the target file look like it is created by compilers that finally allows to reduce the risk of this application being detected by an antivirus as undesired or malicious.