-Symbol obfuscation: Renames symbolic metadata, such as class, field, event, and method names, into meaningless characters. Hash and Minimal renaming schemes allow renaming to be optimized for incremental obfuscation or minimal metadata size. -Control flow obfuscation. -String encryption. -Ability to crash ILDASM: Prevents hackers from using the ILDASM tool, and many other tools based on Microsoft's reflection APIs, to analyze and disassemble your code. -Assembly watermarking: Helps prevent unauthorized distribution of your product by embedding registration data into the visible text and internal binary structures of your executable. -Debug data stripping.
Application deployment -Assembly linking: A new single-assembly output mode allows multi-assembly projects to be combined into a single output assembly, dramatically simplifying deployment of complex multi-assembly .NET applications. Linking is fully integrated into the obfuscation and optimization Pipeline - encryption settings are automatically propagated across linked assemblies and redundant inter-assembly data are merged, reducing output assembly sizes. -.NET Framework embedding. -Assembly compression.
Assembly optimization -Code profiling: Gathers method timing and call statistics, identifying critical performance bottlenecks in your code; fully customizable via an open profiling API. -Dead code and metadata elimination. -Dead and duplicate literal elimination. -Metadata-only assemblies.
Flexible platform -Supports all .NET platforms and languages -Easy to configure and use