Demeanor vs. Dotfuscator vs. SmartAssembly.
The oldest .NET obfuscator. The only one that reads your code first and tells you what would break — before any byte is rewritten. Side-by-side against the two other major .NET obfuscators.
Same author, same owner, 27 years. No acquisitions, no dormant periods, no strategic pivots.
Demeanor reads your compiled assembly and tells you what obfuscates cleanly, what doesn’t, and what to change. No competitor has this.
Unlimited developers, unlimited build agents. No seat counting, no phone-home, no activation server. See pricing →
Drive Demeanor from your AI assistant. No other .NET obfuscator ships this today. Optional for buyers — decisive for the ones who already use Claude Code, Cursor, Windsurf, or Copilot. See the conversation →
Requires your own Claude subscription — not included with Demeanor. The CLI runs the same audit unattended in CI.
| Demeanor Enterprise | Dotfuscator Pro | SmartAssembly | |
|---|---|---|---|
| The audit | |||
| Pre-obfuscation audit of your code | Yes — classified as auto-handled, needs-exclusion, or needs-code-change | No | No |
| Recommends specific fixes (attribute, flag, or code) with file + line | Yes | No | No |
| Framework auto-detection for common .NET patterns | Yes | Limited | Limited |
| Stack-trace mapping command | Yes | Partial (GUI) | Partial (GUI) |
| Modern .NET fit | |||
| Target runtime | .NET 10 / C# 14 | .NET 8 era | .NET 8 era |
| NativeAOT-compatible protection suite | Yes | Not documented | Not documented |
| Distribution | dotnet tool install -g | Installer + VS extension | Installer + VS extension |
| Cross-platform | Win & Linux (x64 + ARM64), macOS (Apple Silicon) | Windows only | Windows only |
| Build integration | MSBuild property + NuGet | Post-build step | Post-build step |
| Works offline / air-gapped | Yes | Requires activation (historical) | Requires activation (historical) |
| Build agents included at no extra cost | Yes | No | No |
| Runs in air-gapped build environments | Yes | Requires activation | Requires activation |
| Runtime agent or service deployed with your app | No | Optional | Optional |
| Protection depth | |||
| Symbol renaming | Yes | Yes | Yes |
| String encryption | Yes | Yes | Yes |
| Control flow obfuscation | Yes | Yes | Yes |
| Call hiding | Yes | Not documented | Not documented |
| Virtual override renaming | Yes | Not documented | Not documented |
| Property/event metadata stripping | Yes | Not documented | Not documented |
| Anti-tamper | Yes | Yes | Not documented |
| Anti-debug | Yes | Not documented | Not documented |
| Decompiled output recompiles as C#? | No (47 compiler errors on sample) | Often | Often |
| Stable name mappings across incremental builds | Yes | Partial | Partial |
| Commercial terms | |||
| Price (annual) | Per-company — see pricing | Quote-only; 2021 public reference was $4,250/yr | Quote-only; typical Redgate tools $500–$2,000/user/yr |
| License model | Per-company, unlimited devs + unlimited CI | Per-seat | Per-user |
| Phone-home activation | No | Yes (historical) | Yes (historical) |
| Free tier | Full renaming, commercial use OK | Community Edition, bundled in Visual Studio — rename only | Trial only |
| Source code license available | Yes (on request) | No | No |
| Continuous ownership | Yes, same author since 1999 | PreEmptive → Idera (2021) → Sembi (2025) | Acquired by Red Gate (2010–11) |
| Built-in crash reporting service | No | No | Yes |
| Visual Studio CE bundling | No | Yes (CE rename-only) | No |
The per-developer math. Demeanor’s flat per-company subscription covers every developer and every build agent. On per-seat or per-user pricing, the competition climbs linearly with team size; Demeanor stays flat. See pricing →
In 2010, Red Gate offered to buy Demeanor. Wise Owl declined. Red Gate bought SmartAssembly instead.
One more thing.
A full conversational walkthrough of Demeanor auditing a real ASP.NET Core sample — 13 turns, verbatim. No other .NET obfuscator ships anything like this today. See the walkthrough →
Still deciding? Community tier is free — install it today, run the audit on a non-critical assembly, and see the output. Upgrade when you’re ready to protect the code that matters.