Demonstrates of eight common code obfuscation techniques
          obfuscation          reverse-engineering          anti-analysis          self-modifying-code          string-encryption          opaque-predicates          name-obfuscation          control-flow-obfuscation          packing-compression          virtualization-intepretation          junk-code-insertation      
    - 
            Updated
            
Sep 4, 2024  - Jupyter Notebook