When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ProGuard - Wikipedia

    en.wikipedia.org/wiki/ProGuard

    ProGuard is an open source command-line tool which shrinks, optimizes and obfuscates Java code. It is able to optimize bytecode as well as detect and remove unused instructions. [4] ProGuard is free software and is distributed under the GNU General Public License, version 2. [3]

  3. DashO (software) - Wikipedia

    en.wikipedia.org/wiki/DashO_(software)

    DashO is a code obfuscator, compactor [clarification needed], optimizer, watermarker [clarification needed], [2] and encryptor for Java, Kotlin and Android applications. [3] It aims to achieve little or no performance loss even as the code complexity increases. [4] [5]

  4. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    Additionally, deobfuscation tools exist, aiming to reverse the obfuscation process. While most commercial obfuscation solutions transform either program source code or platform-independent bytecode (as used by Java and .NET ), some also work directly on compiled binaries.

  5. Code morphing - Wikipedia

    en.wikipedia.org/wiki/Code_morphing

    Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking.This technology protects intermediate level code such as compiled from Java and .NET languages (Oxygene, C#, Visual Basic, etc.) rather than binary object code.

  6. Apache POI - Wikipedia

    en.wikipedia.org/wiki/Apache_POI

    POIFS (Poor Obfuscation Implementation File System [2]) – This component reads and writes Microsoft's OLE 2 Compound document format. Since all Microsoft Office files are OLE 2 files, this component is the basic building block of all the other POI elements.

  7. JAD (software) - Wikipedia

    en.wikipedia.org/wiki/JAD_(software)

    Jad (Java Decompiler) is, as of August 2011, an unmaintained decompiler for the Java programming language. [1] Jad provides a command-line user interface to extract source code from class files . See also

  8. Polymorphic code - Wikipedia

    en.wikipedia.org/wiki/Polymorphic_code

    Emulation may be used to defeat polymorphic obfuscation by letting the malware demangle itself in a virtual environment before utilizing other methods, such as traditional signature scanning. Such a virtual environment is sometimes called a sandbox. Polymorphism does not protect the virus against such emulation if the decrypted payload remains ...

  9. Category:Software obfuscation - Wikipedia

    en.wikipedia.org/wiki/Category:Software_obfuscation

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us