shareapple.com
ShareApple Download -> Security & Privacy -> Encryption Tools -> Code Virtualizer

Editor's Pick
MP3 Audio Recorder - Record any sound and audio stream from PC or internet.
ZGZ Audio Editor - The Secret Weapon to Making Great Sound!
ZGZ Screen Recorder - Record your desktop or live streaming easily and quickly.

Code Virtualizer

Click on the thumbnail to see the full image
Version:   1.280
Platform:   Win95,Win98,WinME,WinNT 3.x,WinNT 4.x,Windows2000,
Price:   59 USD [Buy Now]
Screenshot:   View Screenshot
License:   Shareware
Limitations:   Unknown
Date:   2006-09-19
Size:   3.8
Rate:  
Publisher:   Oreans Technologies
Support:   info@oreans.com

Total Obfuscation Against Reverse Engineering

Code Virtualizer is a powerful code-obfuscation system that helps developers protect their sensitive code areas against Reverse Engineering while requiring minimum system resources. Code Virtualizer will convert your original code (Intel x86 instructions) into Virtual Opcodes that will only be understood by an internal Virtual Machine. Those Virtual Opcodes and the Virtual Machine itself are unique for every protected application, avoiding a general attack over Code Virtualizer. Code Virtualizer can protect your sensitive code areas in any x32 and x64 native PE files (like executable files/EXEs, system services, DLLs , OCXs , ActiveX controls, screen savers and device drivers). Code virtualization consists of the transformation of binary code from a specific machine into a different binary code that is understood by another machine. That is, the instruction set from a specific machine is converted into a new instruction set which is understood by a different machine. Code Virtualizer can generate multiple types of virtual machines with a different instruction set for each one. This means that a specific block of Intel x86 instructions can be converted into different instruction set for each machine, preventing an attacker from recognizing any generated virtual opcode after the transformation from x86 instructions. When an attacker tries to decompile a block of code that was protected by Code Virtualizer, he will not find the original x86 instructions. Instead, he will find a completely new instruction set which is not recognized by him or any other special decompiler. This will force the attacker to go through the extremely hard work of identifying how each opcode is executed and how the specific virtual machine works for each protected application. Code Virtualizer totally obfuscates the execution of the virtual opcodes and the study of each unique virtual machine in order to prevent someone from studying how the virtual opcodes are executed.

Copyright(c)2002-2024 ShareApple networks all right reserved!