Tag

obfuscation

0 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
Aug 1, 2024 · Information Security

Using ProGuard, Xjar, and ClassFinal for Java JAR Obfuscation and Encryption in Spring Boot Projects

This article explains how to protect Java backend code deployed on user servers by applying ProGuard, Xjar, and ClassFinal for JAR obfuscation and encryption, detailing Maven configurations, startup commands, decompilation results, and best‑practice integration of both tools in a Spring Boot project.

ProGuardXjarencryption
0 likes · 24 min read
Using ProGuard, Xjar, and ClassFinal for Java JAR Obfuscation and Encryption in Spring Boot Projects
Selected Java Interview Questions
Selected Java Interview Questions
Jan 30, 2024 · Backend Development

Using ProGuard, Xjar, and ClassFinal to Obfuscate and Encrypt Java JARs in Spring Boot Projects

This article explains how to protect Java server-side code from decompilation by applying ProGuard shrinking/obfuscation and Xjar/ClassFinal encryption, provides detailed Maven plugin configurations, sample pom.xml snippets, command‑line launch options, and demonstrates the resulting protected JARs with screenshots.

ProGuardSpring BootXjar
0 likes · 22 min read
Using ProGuard, Xjar, and ClassFinal to Obfuscate and Encrypt Java JARs in Spring Boot Projects
Java Architect Essentials
Java Architect Essentials
Jan 30, 2024 · Backend Development

Using ProGuard for Java Code Obfuscation in Maven Projects

This article explains how to protect Java applications from decompilation by configuring a ProGuard file and adding the ProGuard Maven plugin, then building the project to generate an obfuscated JAR, complete with step‑by‑step instructions and sample configuration code.

ProGuardbackendbuild
0 likes · 5 min read
Using ProGuard for Java Code Obfuscation in Maven Projects
DeWu Technology
DeWu Technology
Jan 17, 2024 · Mobile Development

Analysis of R8 Class Reflection Optimization and Obfuscation Issues in Android Builds

The article explains how a missing keep rule caused R8’s pre‑AGP 8 reflection optimizer to skip a class because its interface wasn’t in the allowed set, leading to the class name being obfuscated and mismatched in static‑block initialization via Class.forName, and describes the optimizer’s behavior and fixes.

AGPAndroidClassLoading
0 likes · 8 min read
Analysis of R8 Class Reflection Optimization and Obfuscation Issues in Android Builds
vivo Internet Technology
vivo Internet Technology
Dec 20, 2023 · Information Security

Frontend Interface Encryption, JavaScript Obfuscation, and Anti‑Debugging Techniques

The article explains how frontend interface encryption, JavaScript compression, obfuscation, and WebAssembly‑based encryption—combined with signature verification and anti‑debugging tricks such as DevTools detection and infinite debugger loops—can raise the cost of reverse‑engineering client‑side logic, though determined attackers may still eventually break the protection.

JavaScriptdebuggingencryption
0 likes · 19 min read
Frontend Interface Encryption, JavaScript Obfuscation, and Anti‑Debugging Techniques
Code Ape Tech Column
Code Ape Tech Column
Dec 11, 2023 · Information Security

Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection

This article examines common Java jar obfuscation tools, identifies their limitations for protecting both proprietary code and third‑party dependencies, and proposes a lightweight Maven‑based encryption combined with a runtime agent that decrypts classes on demand while keeping performance impact under five percent.

IP ProtectionJAR encryptionagent
0 likes · 9 min read
Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection
Java Architect Essentials
Java Architect Essentials
Nov 15, 2023 · Backend Development

Java Compilation, Decompilation, and Obfuscation Using ProGuard and Maven

This article explains Java compilation and decompilation basics, introduces the JD‑GUI decompiler, and provides a step‑by‑step guide to protect Java applications by configuring ProGuard and integrating it into a Maven build, including sample configuration files and common pitfalls.

CompilationProGuarddecompilation
0 likes · 8 min read
Java Compilation, Decompilation, and Obfuscation Using ProGuard and Maven
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 13, 2023 · Frontend Development

Techniques for Preventing Debugging in Front‑End JavaScript Applications

This article explains why front‑end developers may want to block debugging, demonstrates how infinite `debugger` statements can be used to hinder inspection, and provides multiple counter‑measures—including disabling breakpoints, using `Function('debugger')`, code obfuscation, and an advanced anti‑debug script that detects window size anomalies.

DebuggerJavaScriptanti-debugging
0 likes · 5 min read
Techniques for Preventing Debugging in Front‑End JavaScript Applications
58 Tech
58 Tech
Apr 13, 2023 · Information Security

Android Application Security Hardening and Anti‑Cheat Practices for the 58 Daojia Work Client

This article describes the security upgrade of the 58 Daojia work‑side Android application, covering code and resource obfuscation, signature protection, emulator and root detection, anti‑hook measures, and advanced Dex‑shell and DEX‑VMP techniques, with practical Gradle and Kotlin examples.

AndroidDex EncryptionRoot Detection
0 likes · 16 min read
Android Application Security Hardening and Anti‑Cheat Practices for the 58 Daojia Work Client
Architect's Tech Stack
Architect's Tech Stack
Nov 21, 2022 · Backend Development

How to Obfuscate Java Projects Using ProGuard and Maven

This guide explains Java compilation basics, the need for code obfuscation, provides a complete ProGuard configuration file, shows how to integrate the ProGuard Maven plugin into a pom.xml, and demonstrates building an obfuscated JAR with Maven.

ProGuardbackendjava
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Sohu Tech Products
Sohu Tech Products
Nov 17, 2022 · Information Security

How to Obfuscate Java Projects Using ProGuard and Maven

This article explains the concepts of Java compilation and decompilation, introduces code obfuscation with ProGuard, and provides step‑by‑step Maven configuration to protect Java applications from reverse engineering, including sample configuration files and build commands.

Build ToolsProGuardcode protection
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

PHP One‑Liner Webshells and Evasion Techniques

This article explains various one‑line PHP webshell payloads, compares eval and assert functions, and demonstrates multiple obfuscation methods such as XOR, base64, rot13, concatenation, custom function wrappers, variable variables, class‑based tricks, and version‑specific payloads to bypass WAFs and antivirus detection.

EvasionPHPWebShell
0 likes · 12 min read
PHP One‑Liner Webshells and Evasion Techniques
IT Services Circle
IT Services Circle
Jul 21, 2022 · Frontend Development

Understanding JSFuck: Writing Executable JavaScript with Only []()!+ Characters

This article explains how JavaScript’s type coercion rules allow the construction of any code using only six characters—[]()!+—by demonstrating conversions for booleans, numbers, letters, special symbols, and finally assembling arbitrary executable code via the Function constructor, with examples and a link to the online converter.

JSFuckJavaScriptcode generation
0 likes · 6 min read
Understanding JSFuck: Writing Executable JavaScript with Only []()!+ Characters
JD Retail Technology
JD Retail Technology
Jun 1, 2022 · Mobile Development

Migrating JD Android App to R8: Obfuscation Rules, v1 Signing Issues, and Build Process Pitfalls

This article details JD's Android app migration to the R8 compiler, explains differences between ProGuard and R8, analyzes the impact of the -useuniqueclassmembernames rule, addresses v1 signing loss after AGP 3.6.4 upgrade, and provides practical solutions for build‑process ordering and packaging pitfalls.

AGPAndroidProGuard
0 likes · 23 min read
Migrating JD Android App to R8: Obfuscation Rules, v1 Signing Issues, and Build Process Pitfalls
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

ClassLoaderNative Codecode protection
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
Top Architect
Top Architect
Jan 5, 2022 · Information Security

Common Techniques for Protecting Java Programs from Decompilation

The article outlines several common techniques for protecting Java programs from decompilation, including isolation, class file encryption, native code conversion, and various forms of code obfuscation such as symbol, data, control, and preventive obfuscation, and presents a case study of a protected SCJP exam application.

ClassLoadercode protectiondecompilation
0 likes · 13 min read
Common Techniques for Protecting Java Programs from Decompilation
Python Programming Learning Circle
Python Programming Learning Circle
Jun 20, 2020 · Information Security

Bypassing Implicit Style‑CSS Anti‑Scraping: Analysis and Restoration of Obfuscated Content

This article explains how many Chinese web sites use hidden CSS ::before content to hide characters, shows how to locate the relevant network request, decode the span class mappings from obfuscated JavaScript, and restore the original text for successful web scraping.

CSSJavaScriptanti-scraping
0 likes · 10 min read
Bypassing Implicit Style‑CSS Anti‑Scraping: Analysis and Restoration of Obfuscated Content
Sohu Tech Products
Sohu Tech Products
Jun 17, 2020 · Information Security

Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript

This tutorial explains how to recognize and eliminate dead code and flower‑instruction obfuscation techniques in JavaScript, walks through using Obfuscator.io to generate heavily mixed code, and demonstrates step‑by‑step static analysis to strip away useless statements, ultimately restoring the original concise logic.

JavaScriptReverse Engineeringdead code
0 likes · 12 min read
Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript
Python Programming Learning Circle
Python Programming Learning Circle
Mar 26, 2020 · Information Security

Techniques for Protecting Python Source Code: .pyc Distribution, Obfuscation, py2exe, and Cython

This article explains various methods to protect Python source code—including distributing compiled .pyc files, applying code obfuscation, packaging with py2exe, and compiling with Cython—detailing their concepts, implementation steps, advantages, and limitations.

CompilationCythoncode protection
0 likes · 10 min read
Techniques for Protecting Python Source Code: .pyc Distribution, Obfuscation, py2exe, and Cython
Sohu Tech Products
Sohu Tech Products
Mar 25, 2020 · Information Security

Designing Anti‑Scraping Techniques Using Custom Base64 Encoding

This article explains how to hide real intentions behind visible actions by using text obfuscation and custom Base64‑like encoding to defeat standard web scrapers, detailing the underlying principles, decoding challenges, and Python implementations of a flexible Custom64 encoder.

Base64PythonWeb Security
0 likes · 10 min read
Designing Anti‑Scraping Techniques Using Custom Base64 Encoding