Github Obfuscator

All gists Back to GitHub. Dear all, Today Babel Obfuscator 8. Sign in Sign up javascript-obfuscator angular2 example. NET obfuscator released under MIT license. We are allowed to deny you the right to obfuscate for any given reason at any given time. GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. This module exploits a heap-based pointer corruption flaw in Adobe Reader 9. Added trademark into obfuscated scripts to prevent stealing. It renames the remaining classes, fields, and methods using short meaningless names. Obfuscation, if done with a reliable tool, changes nothing about the reliability of a program. Sometimes, when I have a big need for speed, I might fall back on C (or C++ for better data structures and saner memory management while putting up with all its ugly warts). Of their fonts labeled “bestseller”, 39 out of 49 can be found on Github, as well as 28 of the 30 labeled “top webfont”. Obfuscar, simple and open source obfuscation tool for. Mimikatz Obfuscator. last publish. GitHub has removed many forked projects hosting the malware, but the cybercriminals are very determined and continuously upload the malware on GitHub again and again. javascript obfuscation jjdecode jjencode Today, I try a challenge where I need to decode the jjencode text. Ask Question 1. PHP is one of the most popular languages for web and mobile-app development. Follow their code on GitHub. Put it simply, this library converts a numeric id such as 127 to xVrAndNb and back. The tool's job is to take a text string and show you various ways to obfuscate it. The launch of Polidea's open source code obfuscation tool. ObfuscatedEmpire is a fork of Empire, with Invoke-Obfuscation baked directly into it’s functionality. 2017 Publications. In this paper, we present PowerDrive, an open-source, static and dynamic multi-stage de-obfuscator for PowerShell attacks. Invoke-Obfuscation is a PowerShell v2. If you want to file an issue for any addin listed here, contact the author of the addin. However, if you plan to use it for post-exploitation activities, it is detected by most anti-virus vendors. 0 has been released. 91-100, 2017. Revoke-Obfuscation is an open-source PowerShell v3. ps1 which will enable both Red and Blue Teams to effortlessly create highly obfuscated PowerShell commands so organizations can test their detection. 0+ compatible PowerShell command and script obfuscator. Disabling two-factor authentication for your personal account. Download the deobfuscator. View on GitHub Download. The specific flaw exists within qcpfformat. It has the advantage of lower. Last year I took a class where we had to work with a partner on programming assignments. For information about enhancing Dotfuscator, see the Upgrades page. Invoke-Obfuscation is a PowerShell v2. GitHub does not disclose this to Gentoo, it's found in an audit log of the compromised user's account on 2018-06-29T14:30:18Z; 22:47 GitHub responds, assuring Gentoo that the audit is ongoing and logs will be produced soon. The way I implement the obfuscation is clearly not optimal. NET Reactor and Crypto Obfuscator were of same level but their obfuscation was much inferior to Dotfuscator. Revoke-Obfuscation > PowerShell Obfuscation Detection Using Science Daniel Bohannon - @danielhbohannon Lee Holmes - @Lee_Holmes 0. obfuscator is a C/C++ source-code obfuscation tool. 10, Orebfuscator 4. After several weeks of research and having produced a proof-of-concept code in Python, I have finally found some time to code the obfuscation library in proper programming language. Why Obfuscation? Hiding secrets in software Distributing software patches 10/4/2013 Indistinguishability Obfuscation 5 Vulnerable program Patched program 1,2d0 < The Way that can be told of is not the eternal Way; < The name that can be named is not the eternal name 4c2,3 < The Named is the mother of all things. ; If you know what obfuscators were used, skip the next two steps. Apache POI is your Java Excel solution (for Excel 97-2008). The “Java Decompiler project” aims to develop tools in order to decompile and analyze Java 5 “byte code” and the later versions. The FireEye Labs Obfuscated String Solver (FLOSS) is an open source tool that is released under Apache License 2. Github nbviewer. Alice must now hide / obfuscate this code so it is not detected by Tom or his colleagues. It renames the remaining classes, fields, and methods using short meaningless names. Invoke-Obfuscation is a PowerShell v2. View on GitHub Download. Classes cannot conform to AnyObject in swift 4, so I standardized the initialization with a convenience init. That might include things like acts of God, strikes, lockouts, riots, acts of war, epidemics, communication line failure, and power failures. "GitHub Partner" means a company authorized to resell GitHub Products under the terms and conditions of GitHub's Channel Partner Agreement. java files together with. This new release continue the performance improvement work we started in previous releases plus we improved the obfuscation engine and the metadata parser. Click All near the top of the tab. Here’s the results: Method. Obfuscation. Allatori also adds a small piece of code that decodes the strings at runtime. Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. It provides no encryption! It's strictly a "security through obscurity" tool, with limited usefulness. The company says it's doing so in order to "help developers better identify the tools they need". YAK Pro stands for Yet Another Killer Product. NET, so this project is an initiative to create an obfuscator powerful enougth compared with the obfuscators existing in the market. This module exploits a vulnerability found in the NTR ActiveX 1. Alice gains access to Tom's Git / Github account that has full permissions to write to a public open source repository Alice writes zero-day malicious code which he / she inserts into the repository. It helps to protect. The macro_pack is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. The obfuscated code output now, while being pretty well obfuscated, still is pretty easy to navigate as the execution flow is not changed. Hello guys, today @Vxck and me are releasing the source code for our Lua obfuscator Features: - Bytecode obfuscation just use luamin or something from github. psd1 Invoke-Obfuscation. As a result the hacker, having decompiled the class obfuscated by Allatori,. The obfuscated assemblies with the unregistered version of the product can run only for a limited number of days, after which they will stop working. FREE and easy-to-use JavaScript Obfuscator tool that obfuscates your source code, preventing it from being stolen and used without permission. NET Obfuscator is a comprehensive professional solution for. Here's how to prevent attacks in the enterprise. GitHub Pages Vulnerabilities in GitHub Pages hosted content. This is a project that has been sitting in my private git repository for a long while, and after I was recently reminded of it, I’ve decided to write it up and do an initial release. - Joachim Sauer Mar 29 '10 at 12:06. * Fogger helps you create masked data through configuration files. Info from official site: " ArmDot has a proven approach that is widely used for the unmanaged code: the original code is converted into an array of bytes that is interpreted by special virtual machine. As a result the hacker, having decompiled the class obfuscated by Allatori,. ) The position was obtained via the coarse location feature and was therefore intentionally made inaccurate to a degree. AdNauseam is a free browser extension designed to obfuscate browsing data and protect users from tracking by advertising networks. Dear all, Today Babel Obfuscator 8. 0 Obfuscator is a C# library that converts a non-negative integer into 8-character string, generating a result similar to YouTube video id. Obfuscar is an open source. NET Framework 3. binOb+: A Framework for Potent and Stealthy Binary Obfuscation [ paper] Byoungyoung Lee, Yuna Kim, and Jong Kim. Various T-SQL database obfuscation scripts. But we used RSA so we are more secure. For information about enhancing Dotfuscator, see the Upgrades page. GLSLX is a type checker and minifier/obfuscator for WebGL GLSL code. To render obscure. Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. GitHub Gist: instantly share code, notes, and snippets. NET Obfuscator is an obfuscation tool for. Download Simple Obfuscation apk 0. Various T-SQL database obfuscation scripts. com is a free online T-SQL formatting service using the open-source. GitHub Gist: instantly share code, notes, and snippets. Commonly, PowerShell as such accepts a EncodedCommand parameter, which is a way to pass DOS-unfriendly commands to be safely passed for execution. 0 has been released. Some good software is mentioned at : Obfuscating C/C++ Code obfuscator-llvm/obfuscator. JSFuck decoder, de-obfuscator. After several weeks of research and having produced a proof-of-concept code in Python, I have finally found some time to code the obfuscation library in proper programming language. Passwords can be stored in clear text, obfuscated, checksummed or encrypted in order of increasing security. NET obfuscator as far as I know. View on GitHub. Disabling two-factor authentication for your personal account. sarxos obfuscation. This efficient solution is designed to obfuscate (transform) the source code of the C/C++programs (text files) to protect them from reverse engineering. Academic Research Project about Code Obfuscation - Tamper-Proofing - LLVM - Compilation. Apache POI is your Java Excel solution (for Excel 97-2008). NET obfuscator released under MIT license. A crypter service provides malware obfuscation to evade antimalware security products. To render obscure. Source Maps. Background In the Fall of 2015 I decided to begin researching the flexibility of PowerShell's language and began cataloguing the various ways to accomplish a handful of common techniques that most attackers use on a regular basis. The specific flaw exists within qcpfformat. Zend by Perforce is a proven PHP development platform that delivers the tools, long-term support, and services you need to speed development — and help ensure that your applications are fast, reliable, and secure. Add to Wishlist. It detects and removes unused classes, fields, methods, and attributes. JavaScript obfuscator is a powerful free obfuscator for JavaScript with a wide number of features which provides protection for your source code. GitHub Gist: instantly share code, notes, and snippets. Wanna decode JSFuck?. You may find the bleeding edge builds at the CI Server. GLSLX is a type checker and minifier/obfuscator for WebGL GLSL code. Apache POI is your Java Excel solution (for Excel 97-2008). Recently, a number of obfuscation systems have been developed to aid in censorship circumvention scenarios where encrypted network traffic is filtered. Revoke-Obfuscation is an open-source PowerShell v3. Release Date: 2016-09-25, DerbyCon (Louisville, Kentucky USA). Skip to content. 0 Poor Man's T-SQL Formatter library. ConfuserEx is included with this extension. If you want to file an issue for any addin listed here, contact the author of the addin. General description and data are available on Kaggle. It is the successor of Confuser project. Now that the obfuscation run locally on your Visual Studio project, you need to deploy in AppVeyor. GitHub and Pastebin were also used to host malware for various stages of the infection chain of the SneakyPastes operation attributed to the least sophisticated division of the Gaza Cybergang. MSE) has shown that statistical measurements of packet sizes and packet directions of the first 100 packets in a TCP session can be used to identify the obfuscated protocol with over 96% accuracy. pyminifier. Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, and Jong Kim. So I split the two up, and now Java Deobfuscator is free to download as a separate program on GitHub. Invoke-Obfuscation. Obfuscating Xamarin Applications This article will demonstrate applying obfuscation to your Xamarin android and Windows Phone apps. Introduction. Update dependencies and refine style (#2308) 3. The FireEye Labs Obfuscated String Solver (FLOSS) is an open source tool that is released under Apache License 2. To confuse: his emotions. It uses massive overloading to rename metadata in. Last time, I've added obfuscation support for most common x86 instructions, which allowed to process the obfuscation output several times in order to get even better results. Can GitHub Embrace Obfuscation? June 8, 2018 2462 Views Sebastian Holst In its recent GitHub $7. NET and Asp. This is very useful when you give a script to someone but you don't want them to view your php source code. PowerDrive instruments the PowerShell code to progressively de-obfuscate it by showing the analyst the employed obfuscation steps. Otto Group Product Classification Challenge is a knowledge competition on Kaggle. com Online version:. It provides basic obfuscation features that help secure secrets in a. It can also take a plain text and obfuscate it as source code of a simple program of the above languages. sarxos obfuscation. 0 Poor Man's T-SQL Formatter library. ps1 which will enable both Red and Blue Teams to effortlessly create highly obfuscated PowerShell commands so organizations can test their detection. Even more application protection measures are available to registered users of Dotfuscator Community, and to users of PreEmptive Protection - Dotfuscator Professional, the world's leading. That might include things like acts of God, strikes, lockouts, riots, acts of war, epidemics, communication line failure, and power failures. The only way to make this obfuscator more secure would be to embed a blockchain in the LLVM IR. Script is written according to inet_aton() introduced by 4. GitHub Gist: instantly share code, notes, and snippets. Put it simply, this library converts a numeric id such as 127 to xVrAndNb and back. The source of the list is at [3] 1. C and C++ Obfuscator includes Obfuscation Project Manager - an advanced intuitive cross-platform (Windows, MacOS X, Linux and Unix) graphical user interface for protecting any size project created with C/C++ with mixed types of code , complete with with IDE-like functionality (supporting Build, Rebuild Changed, Clean). JavaScript Obfuscator Tool A free and efficient obfuscator for JavaScript (including ES2017). GitHub does not disclose this to Gentoo, it's found in an audit log of the compromised user's account on 2018-06-29T14:30:18Z; 22:47 GitHub responds, assuring Gentoo that the audit is ongoing and logs will be produced soon. The sender then sends this obfuscated program to a receiver. The idea is to show different ways to manipulate the code and the AST. macro_pack will simplify antimalware solutions bypass and automatize the process from vba generation to final Office document generation. 91-100, 2017. You could obtain the latest source code and releases at GitHub project page. Explore 12 apps like Crypto Obfuscator For. A good obfuscator that change names and line number information should produce a log with which to reverse the process. These warranties will not apply if Customer modifies or uses the Software in any way that is not expressly permitted by this Agreement and the Documentation. Invoke-CradleCrafter - PowerShell Remote Download Cradle Generator & Obfuscator #opensource. In program obfuscation, a sender, who owns a program, transforms the program to create an obfuscated version of the program which is functionally identical to the original version, but it always runs for a fixed time before returning an output. NET code protection. \45\45\32\80\117\116\32\115\99\114\105\112\116\32\104\101\114\101\10 Put the above encoded string into the loadstring below between the quotation marks for the obfuscated scrippts. C Source Code Obfuscator. IP-Obfuscation - Generate hundreds of obscure forms of IP address. This is a multiple classification problem. The obfuscated code output now, while being pretty well obfuscated, still is pretty easy to navigate as the execution flow is not changed. To distinguish the first and the second version of the obfuscator, I created a file src/obfuscator_vs2. You have been warned!. java files together with. But, as I’ve just demonstrated through this article, we can’t rely on obfuscation to protect our applications as it’s easy to crack any application that is relying only on obfuscation for. GitHub today (07. I also added a Gulp task named build2 in gulpfile. An assembly is obfuscated using a program. The name replacer avoids a 1:1 mapping of cleartext names to obfuscated names, the same name may be converted to several different names within different scopes. pyminifier. Use my bulleted checklist in this article as a starting point for choosing an obfuscation tool. Recent research studies have shown that images obfuscated via standard obfuscation, such as pixelization and bluring, can be recovered and re-identified (McPherson et al. - Ira Baxter Oct 2 '11 at 19:12. Unknown Unknown Unknown Unknown Unknown: 4. If you're an addin author and want your addin listed here, follow the instructions here. However, if you plan to use it for post-exploitation activities, it is detected by most anti-virus vendors. class files for the. There are around 200 useful operations in CyberChef for anyone working on anything vaguely Internet-related, whether you just want to convert a timestamp to a different format, decompress gzipped data. Its central data-structure is a collection of circular doubly linked lists, the elements of which correspond to the maze-cells of one row of the maze, the one currently being generated. NET Obfuscator is an obfuscation tool for. Keep in mind that this is only one example of an obfuscation technique. 0+ compatible PowerShell command and script obfuscator. A good obfuscator that change names and line number information should produce a log with which to reverse the process. The purpose of obfuscators in general is to hide program code, flow, and functionality. Dotfuscator Community offers basic protection out-of-the-box. CHỮ HOA > chữ thường. Sign in Sign up javascript-obfuscator angular2 example. Popular Alternatives to Crypto Obfuscator For. JavaScript Obfuscator has 8 repositories available. 5 for Android. The stalker spends a point of ki as a full round action to activate his obfuscation, and as long as he remains in a non- threatening posture (by carrying no weapons in hand and moving at half his base speed) the stalker radiates a psychic field. Original names must be restored using included par-files. grunt-obfuscator. The variables have been renamed but we can still see where the code saves the user's credentials. NET Obfuscator. UPX is a free, portable, extendable, high-performance executable packer for several executable formats. NET applications Windows Defender pegs the CPU at 100% utilization and takes 16 seconds to scan the file before the application is launched. PyArmor is a command line tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts. io is a third-party service which tracks SDKs usage in the top iOS + Android apps. GitHub today (07. Dotfuscator Community offers basic protection out-of-the-box. Yunjong Jeong. To properly demonstrate the effectiveness of each minification, obfuscation, and compression method we'll minify the pyminifier. An analysis of the Warbird virtual-machine protection for the CI!g_pStore by Alexandre Gazet: Post, GitHub. This new release continue the performance improvement work we started in previous releases plus we improved the obfuscation engine and the metadata parser. Jul 27, 2014. The FireEye Labs Obfuscated String Solver (FLOSS) uses advanced static analysis techniques to automatically deobfuscate strings from malware binaries. - Ira Baxter Oct 2 '11 at 19:12. This utility is only an effort to. Alice must now hide / obfuscate this code so it is not detected by Tom or his colleagues. The techniques used to obscure the intent of an application can vary widely. Recently, a number of obfuscation systems have been developed to aid in censorship circumvention scenarios where encrypted network traffic is filtered. Why Obfuscation? Hiding secrets in software Distributing software patches 10/4/2013 Indistinguishability Obfuscation 5 Vulnerable program Patched program 1,2d0 < The Way that can be told of is not the eternal Way; < The name that can be named is not the eternal name 4c2,3 < The Named is the mother of all things. Other usages are in malware. Instead of compiling from a source language to machine code, it compiles from JavaScript to better JavaScript. To properly demonstrate the effectiveness of each minification, obfuscation, and compression method we’ll minify the pyminifier. NET assemblies. Basic renaming obfuscation isn't enough. I'm pleased to report that after fixing some performance issues in 4. Allatori also adds a small piece of code that decodes the strings at runtime. 0/00 > Whois. We are working together with GitHub, supplying them with new repositories containing the malware, which GitHub is removing. 1 and i've discovered the problem. Script is written according to inet_aton() introduced by 4. The obfuscation of fonts was allowed prior to EPUB 3. Maven is - at its heart - a plugin execution framework; all work is done by plugins. NET Framework, Linux, Mac, Windows Phone and more. Not many public. Sign in Sign up javascript-obfuscator angular2 example. Obfuscation techniques usually involve comments/docs stripping, name mangling, trash code insertion, and so on, so even if you decompile bytecode, you get not very readable sources. The obfuscated code output now, while being pretty well obfuscated, still is pretty easy to navigate as the execution flow is not changed. Our thrust into secure architectures focuses on the security of memory systems in computers such as encryption, obfuscation, and efficient data integrity verification schemes. ConfuserEx is really one of the most known open source. The “Java Decompiler project” aims to develop tools in order to decompile and analyze Java 5 “byte code” and the later versions. GitHub Pages Vulnerabilities in GitHub Pages hosted content. GitHub Gist: instantly share code, notes, and snippets. A crypter service provides malware obfuscation to evade antimalware security products. I’m not saying that the Phoenix Protector’s code obfuscation can’t be reversed. 6 years ago. It provides basic obfuscation features that help secure secrets in a. A Java bytecode obfuscator supporting. 0/00 > Whois. Tancrède Lepoint is a Research Scientist at Google. pyminifier. I have some experience obfuscating Xamarin Android projects but I'm hitting a wall with Xamarin Forms. A Large Scale Study of Programming Languages and Code Quality in Github CACM, 60 (10), p. Looking for a specific goal to execute? This page lists the core plugins and others. With the gradle option --info --stacktrace, you should get more information about the crash. It is a member of SD's family of Source Code Obfuscators. The problem? If you choose a free obfuscator over a premium obfuscator backed by industry leaders, you may be increasing your risk. I'm pleased to report that after fixing some performance issues in 4. macro_pack will simplify antimalware solutions bypass and automatize the process from vba generation to final Office document generation. Then obfuscated each with 5 different obfuscators: Allatori, DexGuard, Jshrink, Klassmaster, and ProGuard, and for each of the obfuscator, we further complied apps with 4 different obfuscation types: Default, Layout, Data, and Control. As a result, invalid fonts might be encountered after decompression and de-obfuscation. Make even obfuscated JavaScript code readable. Simple Obfuscation. I don't see how would I legitly do U. Obfuscation is the process which involves the process to convert your code to a equivalent or specific format such that it becomes difficult to understand and difficult to reverse engineering. Skip to content. Obfuscation is not used to avoid decompiling C++ code, it is intended to avoid understanding, it is designed to fool and fake the cracker, making nosense calls to OS routines, writting in dummy buffers, altering and swaping with real data. NET Obfuscator is an obfuscation tool for. Layering: Cybersecurity uses multiple layers of defense when protecting information or resources. Yunjong Jeong. Here are a couple of open source tools that address masking an obfuscation. Obfuscation. " "New audiences" in this context mean, quite literally, GitHub's 28 million developer users. Installation $ npm install grunt-obfuscator --save-dev Usage. None Eval Array _Number JSFuck JJencode AAencode URLencode Packer Javascript Obfuscator My Obfuscate Unreadable. GitHub repo. The latest Tweets from Obfuscator-LLVM (@ollvm). All gists Back to GitHub. Obfuscation/Encoding This tool can run programs written in the Brainfuck and Ook! programming languages and display the output. indicators of obfuscation • Red Team - increased awareness of options for evading detection • Pros/Cons of each obfuscation technique we discuss • Open Source Tool - Invoke-Obfuscation • Make employment of these techniques simple • Attackers are already obfuscating - test your detection capabilities. Documentation section contains most information you need, and also a detailed history of this project all through the years. I am trying to obfuscate a simlpe java application with an external lib "webcam. And it’s something some of us don’t do very well. Hackers can choose to inject a known backdoor, but then they risk being easily detected. What is the ideal and most preferred way of obfuscating ios projects ? My code has c, c++, objc and java script code. Put it simply, this library converts a numeric id such as 127 to xVrAndNb and back. While Empire is great for executing in-memory PowerShell, it does little in the way of obfuscation. Add to Wishlist. Use my bulleted checklist in this article as a starting point for choosing an obfuscation tool. The source code of Obfuscar is available at GitHub. Otto Group Product Classification Challenge is a knowledge competition on Kaggle. Of the deduped list of 29,951 fonts, 7,617 were present on Github — that's a quarter of the entire MyFonts collection. NET Obfuscator is a comprehensive professional solution for. ConfuserEx v1. So far obfuscation hasn't done a lot to protect our username and password. - Ira Baxter Oct 2 '11 at 19:12. Obfuscating Xamarin Applications This article will demonstrate applying obfuscation to your Xamarin android and Windows Phone apps. 0 Released! - Eazfuscator: A previously free obfuscator, with good obfuscation strength and compatibility. DISCLAIMER: By using this utility, you hereby confirm and agree that Perl Obfuscator, its employees, agents, and affiliates, shall not be responsible or liable for any loss or damage to any person or property caused by the use of this service directly or indirectly or through other third party applications. Using VBA Emulation to Analyze Obfuscated Macros Wed, 09/28/2016 - 18:50 — decalage ViperMonkey is an experimental toolkit that I have been developing since early 2015, to parse VBA macros and emulate their execution. 0/00 > Whois. A total of 316. In his article, Why A Free Obfuscator is Not Always Free, Peter Gramantik discusses an experience he had with a "free" JavaScript obfuscator. Limited Warranties. While nothing in ObfuscatedEmpire is "new", it does allow for something new: executing an obfuscated PowerShell C2 channel totally in-memory. While code obfuscation is not worthless, you should be careful to not get a false sense of security -- of it can be executed, it can be deobfuscated, and very often trivially. In fact, there is a tool available on GitHub called Invoke-Obfuscation. NET obfuscator, made by people who care. pyminifier. This is a multiple classification problem. 2016, Hill et al. Moreover I'm not consistent across the code. OLE2 files include most Microsoft Office files such as XLS, DOC, and PPT as well as MFC serialization API based file formats. ocx, and can be triggered with a long string argument for the InternationalSeparator() method of the ISSymbol control. ISSISP 2017 - Obfuscation I Supported by NSF grants 1525820 and 1318955 and by the private foundation that shall not be named Engineering Code Obfuscation. YAK Pro - Php Obfuscator. For closed corporate code I would prefer something that makes your code I18N compliant, signs every assembly and provides the customers a way to let them know if their version have being tampered. GitHub repo. Even more application protection measures are available to registered users of Dotfuscator Community, and to users of PreEmptive Protection - Dotfuscator Professional, the world's leading. Using APKPure App to upgrade Simple Obfuscation, fast, free and save your internet data. strsim - string similarity based on Dice's coefficient in go #opensource. Info from official site: " ArmDot has a proven approach that is widely used for the unmanaged code: the original code is converted into an array of bytes that is interpreted by special virtual machine. The “Java Decompiler project” aims to develop tools in order to decompile and analyze Java 5 “byte code” and the later versions. UPX homepage: the Ultimate Packer for eXecutables. NET is a top-grade. To distinguish the first and the second version of the obfuscator, I created a file src/obfuscator_vs2.