1

Encrypt strings Secrets

News Discuss 
Your C# software could then use reflection to generate calls to this exterior/unmanaged dll. It would maximize The issue for de-obfuscating, but the situation is if someone wishes it lousy sufficient, they could figure it out as it can be customer-aspect. You might have posted a have confidence in deserving http://csharpobfuscator90000.tinyblogging.com/dll-obfuscator-Fundamentals-Explained-28811433

Comments

    No HTML

    HTML is disabled


Who Upvoted this Story