Demonstrates of eight common code obfuscation techniques
obfuscation reverse-engineering anti-analysis self-modifying-code string-encryption opaque-predicates name-obfuscation control-flow-obfuscation packing-compression virtualization-intepretation junk-code-insertation
-
Updated
Sep 4, 2024 - Jupyter Notebook