Human edited web directory based on the DMOZ data. To find out more about this project please use the top main menu.
Sites 13
Loading new listings for you to review...
- JODE (Java Optimize and Decompile Environment) Can be used to optimize, obfuscate and/or decompile code. [Open Source, GPL]
- JCloak Bytecode obfuscator to protect code from reverse engineering. [Commercial]
- Jshrink Removes unused code and data then obfuscates symbolic names in class files. [Commercial]
- Zelix KlassMaster Java obfuscator with flow obfuscation, string literal encryption, scripting, Ant integration, incremental obfuscation, obfuscated line numbers, J2ME plugin and stack trace translation. Also removes unused classes, fields and methods. [Commercial]
- jarg - Java Archive Grinder Shrinks and obfuscates jar files. Runs from the command line or as an Ant task. [Open source, BSD]
- ProGuard Shrinks and obfuscates, with template-based configuration. Comes with an Ant task, a J2ME WTK plugin, and a tool to de-obfuscate stack traces. [Open source, GPL]
- JavaGuard Obfuscates. Updated version of RetroGuard. Can be run from the command-line or using a GUI. [Open source, GPL]
- yGuard Bytecode obfuscator configurable to run through Ant build scripts. [Freeware, core library is open source, LGPL]
- Semantic Designs Java Obfuscator Scrambles source code using nonsense names and stripping comments to disable reverse engineering. Works on large sets of files. [Commercial]
- JBCO: The Java Bytecode Obfuscator A Bytecode Obfuscator with third-generation control-flow transformations. [Open source]
- Allatori Java Obfuscator Performs name and flow obfuscation, string encryption, application size reduction, and provides watermark functionality. Site includes documentation, download option, and FAQ section. [Commercial]
- Protect Your Java Code - Through Obfuscators and Beyond Introduction to Java code obfuscation, documenting where it falls short and what can be done about that.
- DashO Java Obfuscator Provides obfuscation and optimization. Includes overload induction renaming, control flow obfuscation, string encryption, and watermarking. Site includes documentation, support forum, and evaluation download. [Commercial]