Code Obfuscation Interface

The code obfuscation feature mainly targets Objective-C (OC) and Swift classes and functions.
For Flutter or hybrid applications, the final output is still compiled into OC or Swift binaries, so no additional language configuration is required.

Interface Layout:

  • Top: Display controls (view mode, risk level filter, name search, etc.)
  • Middle: Function / method name list
  • Bottom: Switches and obfuscation strength controls

Code Obfuscation Interface


OC and Swift Class Name Obfuscation

Steps:

  1. Select the target executable binary file at the top.
  2. The middle panel lists the classes in the file, with risk level annotations.
  3. It is recommended to start with low-risk classes for obfuscation.
  4. For classes with dynamic or reflection-based calls, obfuscate with caution and ensure thorough testing.

Display Modes

  • All: Show all classes.
  • Selected: Show only the checked classes (useful for reviewing configured items).
  • Unselected: Show only unchecked classes (to confirm if any items are missed).

Risk Levels

  • Filter class names based on assigned risk levels.
  • Risk levels are for reference only and should not be treated as absolute standards.
  • The final decision to obfuscate should be based on actual project testing results.

Method Name Search

  • Enter a method name keyword in the search box.
  • After searching, all classes and methods containing the keyword will be displayed.

Obfuscation Strength

  • Controls the readability of strings after obfuscation.
  • Higher strength → More unreadable strings, increasing reverse-engineering difficulty.

Modes

Define how class obfuscation is applied:

  • Skip: Do not obfuscate.
  • Whitelist Mode: Only obfuscate the selected classes or methods.
  • Blacklist Mode: Skip the selected items, obfuscate all others.

Save Configuration

  • After configuration, click Save Configuration.
  • Settings will be stored and reused in future operations without reconfiguration.