No, if you have the source it must be quite complex before you can't figure it out without single stepping through it, so usually that is a waste of time.
Most code obfuscation ways counter extracting sources from e.g. C# or Java programs where due to introspection there is a lot of identifiers in the binary.
marcov wrote: ↑Aug 20, 2022 11:10
No, if you have the source it must be quite complex before you can't figure it out without single stepping through it, so usually that is a waste of time.
Most code obfuscation ways counter extracting sources from e.g. C# or Java programs where due to introspection there is a lot of identifiers in the binary.