After using SmartAssembly \ Dotfuscator and so confused, how to crack when decompile applications?
Anti-aliasing tool is a very NB: de4dot (open source)
Github Address: https://github.com/0xd4d/de4dot
Also it can be used directly after the package I've compiled: https://files.cnblogs.com/files/kybs0/de4dot_netcoreapp3.0.zip
It supports very, very much obfuscation tool:
- Agile.NET (aka CliSecure)
- Babel.NET
- CodeFort
- CodeVeil
- CodeWall
- CryptoObfuscator
- DeepSea Obfuscator
- Dotfuscator
- .NET Reactor
- Eazfuscator.NET
- Goliath.NET
- ILProtector
- MaxtoCode
- MPRESS
- Rummage
- Skater.NET
- smartassembly
- Spices.Net
- Xenocode
Source authors, there may be some BUG while there may be some anti-aliasing
After my trial, objective review: Super powerful. . .
Instructions:
Which has been obfuscated xxx.exe / dll directly dropped on de4dot.exe, then it will generate xxx-cleaned.exe / dll
More detailed operation of the function / command, see de4dot documents
This is the result of decompilation before the anti-aliasing:
This is the result of decompilation anti-aliasing:
Not be confused with the code before the same