Jfuscator Features

Obfuscation That Works
Obfuscation
String Morphing
String Morphing
Smart Flow Obfuscation
Smart Flow
Highly Configurable
Highly Configurable
Obfuscation That Works

Obfuscation That Works

Jfuscator Protects more of your application than any other obfuscator because it knows what is safe to change and what needs to be left alone. Jfuscator automatically detects and modifies calls to reflection API to remain consistent with renamed symbols names.

String Morphing

String Morphing

Morph strings that contain sensitive data, making an attack based on targeting encrypted strings impossible.

Smart Flow Obfuscation

Smart Flow Obfuscation

Break high level constructs such as loops, conditional and branching instructions by applying code transformations at byte code level. Jfuscator obscures program flow without changing what the code does at runtime.

Highly Configurable

Highly Configurable

Use the exclusions dialog to seamlessly avoid the renaming of unwanted classes, methods or fields.