Intended for legal use in protecting software.
- Anti-Debugging Routines
- Runtime Code Encryption
- Stealth Techniques
- Code Obfuscation
- Anti-Debugging (Multithreaded, self-spawning checkers)
- Runtime Code Encryption (One plaintext instruction at any time using VEHs and SEHs)
- Self-Checksum
- Expunge Import Information
- Stealth Techniques (Hooking API/DLL/IAT, Process Hollowing)
- Code Obfuscation