WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Source rust-native-obf — Native Obfuscation Library for Rust Binaries

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
247
Reaction score
7
Hey everyone,

Just dropped a lightweight native obfuscator library for Rust. Nothing fancy, just practical techniques to make life a bit harder for anyone trying to dump your strings or trace your logic. Keeps automated tools from easily static-analyzing your Rust binaries.

Features:
  1. String Obfuscation: Runtime XOR encryption.
  2. Multilayer Encryption: Nested data encryption with varied keys.
  3. Compile Time Hashing: FNV1a hashing at compile time.
  4. Control Flow Obfuscation: Junk code injection to break analysis.
  5. Opaque Predicates: Always-true conditionals to confuse flow.
  6. Value Encoding: Hide constants via multiplicative inverse.
  7. Stack Strings: Offloads string storage to the stack.
  8. Function Pointer Obfuscation: Mangles pointers for indirect calls.
  9. Integer Scrambling: Reversible obfuscation (XOR, rotate, multiply).

Usage:

Add to your Cargo.toml:
Code:
[dependencies]
rust-native-obf = "0.1.0"

Basic implementation:
Code:
use rust_native_obf::*;

fn main() {
    let secret = obf_string!("my secret key");
    let hash = ct_hash!("compile time hashing");

    let result = confuse_flow!({
        let x = 42;
        x * 2
    });

    let hidden = hide_call!({
        sensitive_function(100)
    });

    let scrambled = scramble_int(12345);
}

String obfuscation: Runtime XOR with random keys.
Multilayer: Sequential key application.
Compile time hash: FNV1a generation during the build.
Opaque predicates: Uses system time entropy.
Value encoding: Multiplicative inverse math.
Function pointers: XOR mangling of addresses.

Download:
You cant view this link please login.

Run the example with
Code:
cargo run --example basic

Note: This is obfuscation, not crypto. Don't rely on this to secure actual secrets in client-side binaries; use it to deter low-level reverse engineering and basic automated dumping.

Let me know if you find bugs or have ideas for new features. Keeping it simple and functional for now. Enjoy!
 
Top