- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 247
- Reaction score
- 7
Hey everyone,
Just dropped a lightweight native obfuscator library for Rust. Nothing fancy, just practical techniques to make life a bit harder for anyone trying to dump your strings or trace your logic. Keeps automated tools from easily static-analyzing your Rust binaries.
Features:
Usage:
Add to your Cargo.toml:
Basic implementation:
Download:
Run the example with
Note: This is obfuscation, not crypto. Don't rely on this to secure actual secrets in client-side binaries; use it to deter low-level reverse engineering and basic automated dumping.
Let me know if you find bugs or have ideas for new features. Keeping it simple and functional for now. Enjoy!
Just dropped a lightweight native obfuscator library for Rust. Nothing fancy, just practical techniques to make life a bit harder for anyone trying to dump your strings or trace your logic. Keeps automated tools from easily static-analyzing your Rust binaries.
Features:
- String Obfuscation: Runtime XOR encryption.
- Multilayer Encryption: Nested data encryption with varied keys.
- Compile Time Hashing: FNV1a hashing at compile time.
- Control Flow Obfuscation: Junk code injection to break analysis.
- Opaque Predicates: Always-true conditionals to confuse flow.
- Value Encoding: Hide constants via multiplicative inverse.
- Stack Strings: Offloads string storage to the stack.
- Function Pointer Obfuscation: Mangles pointers for indirect calls.
- Integer Scrambling: Reversible obfuscation (XOR, rotate, multiply).
Usage:
Add to your Cargo.toml:
Code:
[dependencies]
rust-native-obf = "0.1.0"
Basic implementation:
Code:
use rust_native_obf::*;
fn main() {
let secret = obf_string!("my secret key");
let hash = ct_hash!("compile time hashing");
let result = confuse_flow!({
let x = 42;
x * 2
});
let hidden = hide_call!({
sensitive_function(100)
});
let scrambled = scramble_int(12345);
}
String obfuscation: Runtime XOR with random keys.
Multilayer: Sequential key application.
Compile time hash: FNV1a generation during the build.
Opaque predicates: Uses system time entropy.
Value encoding: Multiplicative inverse math.
Function pointers: XOR mangling of addresses.
Multilayer: Sequential key application.
Compile time hash: FNV1a generation during the build.
Opaque predicates: Uses system time entropy.
Value encoding: Multiplicative inverse math.
Function pointers: XOR mangling of addresses.
Download:
You cant view this link please login.
Run the example with
Code:
cargo run --example basic
Note: This is obfuscation, not crypto. Don't rely on this to secure actual secrets in client-side binaries; use it to deter low-level reverse engineering and basic automated dumping.
Let me know if you find bugs or have ideas for new features. Keeping it simple and functional for now. Enjoy!