Tag

code obfuscation

0 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Aug 4, 2024 · Information Security

Java Code Obfuscation and Encryption with ProGuard, Xjar, and ClassFinal

The guide explains how to protect a Java core module deployed on user servers by integrating ProGuard for bytecode obfuscation, Xjar for JAR encryption, and ClassFinal for class‑file encryption, providing Maven plugin configurations, startup commands, and verification that the combined approach renders decompiled code empty or unreadable.

ClassFinalProGuardXjar
0 likes · 20 min read
Java Code Obfuscation and Encryption with ProGuard, Xjar, and ClassFinal
macrozheng
macrozheng
Jul 19, 2024 · Backend Development

Master Java Obfuscation: 5 Crazy Tricks to Write Unreadable Code

This article reveals five advanced Java tricks—using Unicode escapes in comments, over‑complicating simple logic with bitwise shifts, tampering with Boolean.TRUE via reflection, forcing both branches of an if‑else to run, and leveraging the Unsafe class for low‑level memory manipulation—to deliberately make code hard to understand.

UnicodeUnsafebitwise
0 likes · 12 min read
Master Java Obfuscation: 5 Crazy Tricks to Write Unreadable Code
macrozheng
macrozheng
Jan 11, 2024 · Information Security

How to Secure Your SpringBoot Application from Decompilation with ClassFinal

This guide explains how to protect a SpringBoot-based e‑commerce project from source leakage by using code obfuscation or the ClassFinal Maven plugin, detailing configuration, startup options, decompilation results, and machine‑binding to ensure the packaged jar runs only on authorized servers.

ClassFinalJava securitySpringBoot
0 likes · 7 min read
How to Secure Your SpringBoot Application from Decompilation with ClassFinal
Java Captain
Java Captain
Dec 19, 2023 · Backend Development

Securing Spring Boot Production Packages with Code Obfuscation and Encryption Using ClassFinal Maven Plugin

This guide explains how to protect Spring Boot production packages from reverse engineering by applying code obfuscation with ProGuard and full encryption using the ClassFinal Maven plugin, including configuration steps, encrypted startup commands, machine‑binding activation, and the resulting decompilation behavior.

ClassFinalSpring Bootcode obfuscation
0 likes · 6 min read
Securing Spring Boot Production Packages with Code Obfuscation and Encryption Using ClassFinal Maven Plugin
Code Ape Tech Column
Code Ape Tech Column
Sep 18, 2023 · Information Security

Java Code Obfuscation with ProGuard: Configuration and Maven Integration

This article explains how to protect Java applications from reverse engineering by using ProGuard for code obfuscation, detailing the creation of a proguard.cfg file, Maven plugin configuration, and the build process to generate an obfuscated JAR.

ProGuardbackendcode obfuscation
0 likes · 7 min read
Java Code Obfuscation with ProGuard: Configuration and Maven Integration
Code Ape Tech Column
Code Ape Tech Column
Nov 17, 2022 · Information Security

Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide

This article explains how Java source files are compiled into class files, how they can be decompiled, and provides a detailed, code‑rich tutorial on protecting a Spring Boot project by configuring ProGuard through a proguard.cfg file and Maven plugin to produce an obfuscated JAR.

Backend DevelopmentProGuardcode obfuscation
0 likes · 7 min read
Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide
php中文网 Courses
php中文网 Courses
Oct 18, 2022 · Information Security

In-Memory PHP Trojan: Source Code, Explanation, and Mitigation

This article explains the concept of in‑memory PHP trojans, provides simple obfuscated source code that deletes itself and persists in RAM, discusses their stealth characteristics, and offers a basic mitigation strategy of terminating the process and removing the generated files.

Memory TrojanPHPcode obfuscation
0 likes · 3 min read
In-Memory PHP Trojan: Source Code, Explanation, and Mitigation
macrozheng
macrozheng
Sep 6, 2022 · Backend Development

How to Write Java Code That Even Your Colleagues Can’t Understand

Explore a series of unconventional Java tricks—from Unicode escape hacks and bitwise tricks to reflection-based Boolean tampering and Unsafe memory manipulation—that let you deliberately obfuscate code, making it hard for teammates to read, modify, or even predict its behavior.

Unsafebitwisecode obfuscation
0 likes · 14 min read
How to Write Java Code That Even Your Colleagues Can’t Understand
Ctrip Technology
Ctrip Technology
Nov 11, 2021 · Information Security

Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies

This article examines the security challenges faced by mobile applications, outlines static, dynamic, and business‑level attack vectors, and presents comprehensive hardening techniques—including environment detection, data collection, code and algorithm obfuscation, and virtual‑machine protection—illustrated with iOS‑specific examples and code snippets.

Mobile Securityapp hardeningcode obfuscation
0 likes · 13 min read
Mobile App Security Hardening: Risks, Detection Techniques, and Protection Strategies
Java Captain
Java Captain
Sep 19, 2021 · Fundamentals

How to Write Unmaintainable Code: A Satirical Guide

This tongue‑in‑cheek article enumerates a series of deliberately harmful programming practices—from confusing naming conventions and deceptive comments to excessive abstraction, misuse of inheritance, and avoidance of testing—intended to make code virtually impossible to understand, maintain, or debug.

code obfuscationcoding practicesjava
0 likes · 14 min read
How to Write Unmaintainable Code: A Satirical Guide
Sohu Tech Products
Sohu Tech Products
Jun 16, 2021 · Mobile Development

Android Code Obfuscation: ProGuard, R8, D8 and Build Process Deep Dive

This article provides a comprehensive guide to Android code obfuscation, covering the purpose and benefits of minification, detailed ProGuard/R8 configuration, resource shrinking, desugaring, D8/R8 internals, custom obfuscation dictionaries, and modular ProGuard rules for multi‑module projects.

AndroidD8Gradle
0 likes · 23 min read
Android Code Obfuscation: ProGuard, R8, D8 and Build Process Deep Dive
Sohu Tech Products
Sohu Tech Products
Apr 7, 2021 · Mobile Development

Android Code Obfuscation: ProGuard vs R8 and Configuration Guide

This article explains Android code obfuscation, compares ProGuard and R8, details their four core functions, shows how to enable or disable them via Gradle settings, discusses ProGuard rule syntax and sources, and provides best practices for modular projects and componentized obfuscation.

AndroidBuild ToolsDex
0 likes · 12 min read
Android Code Obfuscation: ProGuard vs R8 and Configuration Guide
58 Tech
58 Tech
May 13, 2020 · Information Security

Dynamic Signature Strategies for API Security: Attack and Defense Techniques

This article explores the cat‑and‑mouse battle between crawlers and API endpoints, detailing how dynamic signatures, token‑based authentication, time‑bound hashes, rate‑limiting, and code obfuscation can be used to defend against scraping while also showing how attackers can reverse‑engineer and bypass these defenses.

API securityRate Limitinganti-crawling
0 likes · 12 min read
Dynamic Signature Strategies for API Security: Attack and Defense Techniques
Beike Product & Technology
Beike Product & Technology
Mar 23, 2018 · Frontend Development

Building JavaScript from Six Characters: A jsFuck Tutorial

This article explains how JavaScript’s type coercion rules can be exploited to construct any string or code using only the characters []()+! and demonstrates step‑by‑step how to build letters, functions, and even execute code, illustrating the principles behind the jsFuck obfuscation technique.

JSFuckJavaScriptcode obfuscation
0 likes · 7 min read
Building JavaScript from Six Characters: A jsFuck Tutorial
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 8, 2017 · Mobile Development

APK Size Reduction Techniques for the iQIYI Android Client

The article outlines a comprehensive set of APK‑slimming techniques for the iQIYI Android client—including pluginization, 7‑ZIP recompression, apksigner signing, duplicate‑resource removal, PNG/WebP conversion, library trimming, code obfuscation, R‑class elimination, language‑config pruning and native‑ABI reduction—that together cut the package from 54.2 MB to 28.2 MB.

APK optimizationAndroidGradle
0 likes · 20 min read
APK Size Reduction Techniques for the iQIYI Android Client
Hujiang Technology
Hujiang Technology
Aug 7, 2017 · Frontend Development

Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation

This article walks through the reverse‑engineering of a compact JavaScript one‑liner that draws a patterned image, refactors it into readable modules, explains each transformation—including variable renaming, loop conversion, ternary expansion, bitwise operations, and switch‑case replacement—while illustrating the underlying math with graphs and code snippets.

Bitwise OperationsFrontend DevelopmentJavaScript
0 likes · 18 min read
Reverse Engineering a One‑Line JavaScript Animation: Step‑by‑Step Explanation