Options Reference
Detailed documentation for every obfuscation option. Each page includes CLI and MSBuild usage, real before/after ILSpy output, and guidance on when to disable.
Community
Enterprise See pricing
Everything in Community, plus:
Aggressive Mode Strip property and event metadata so decompilers cannot reconstruct source-level structure. String Encryption Remove literal text from the shipped file; strings are reconstructed only when the application uses them. Constants Encryption Replace numeric literals with equivalent expressions; the original values never appear in the decompiled output. Resource Encryption Compress and encrypt embedded resources; the application loads them transparently. Call Hiding Defeat static call-graph analysis so decompilers cannot resolve which methods call which. Control Flow Obfuscation Make the order of operations inside each method unreadable; the decompiled output cannot be followed back to the original logic. Hinder Reflection Make reflection-based tools less reliable and refuse to disassemble in the .NET SDK ildasm tool. Include Publics Obfuscate public/protected symbols — for executables not referenced by other assemblies. Virtual Override Renaming Rename overrides of framework methods like ToString and interface implementations while runtime dispatch still works. Enum Deletion Decompilers see empty enums with no symbolic names; raw integer values appear at every use site. Anti-Tamper The application terminates immediately if the assembly is modified after build. NativeAOT-compatible. Anti-Debug The process exits when a managed or native debugger attaches. NativeAOT-compatible. Include Dependencies Obfuscate co-located private dependencies; cross-assembly references stay consistent. Incremental Obfuscation Preserve name mappings between versions for serialization compatibility.