.NETReactorSlayer is an open source (GPLv3) deobfuscator for Eziriz .NET Reactor.
GUI | CLI |
---|---|
Command | Description | Default Value |
---|---|---|
Unpack native stub | ||
--dec-methods |
Decrypt methods that encrypted by Necrobit | True |
--dec-calls |
Decrypt hidden calls | True |
--dec-strings |
Decrypt strings | True |
--dec-rsrc |
Decrypt assembly resources | True |
--dec-tokens |
Decrypt tokens | True |
--dec-bools |
Decrypt booleans | True |
--deob-cflow |
Deobfuscate control flow | True |
--dump-asm |
Dump embedded assemblies | True |
--dump-costura |
Dump assemblies that embedded by Costura.Fody | True |
--inline-methods |
Inline short methods | True |
--rem-antis |
Remove anti tamper & anti debugger | True |
--rem-sn |
Remove strong name removal protection | True |
--rem-calls |
Remove calls to obfuscator methods | True |
--rem-junks |
Remove junk types, methods, fields, etc... | True |
--keep-types |
Keep obfuscator types, methods, fields, etc... | False |
--preserve-all |
Preserve all metadata tokens | False |
--keep-max-stack |
Keep old max stack value | False |
--no-pause |
Close CLI immediately after deobfuscation | False |
--verbose |
Verbose mode | False |
Just drag and drop target obfuscated assembly on it.
-
If target assembly not working after deobfuscation try using
--preserve-all
and/or--keep-max-stack
command(s). -
Since .NETReactorSlayer does not yet have the ability to de-virtualize virtualized functions, if the target protected assembly contains virtualized functions, .NETReactorSlayer may fail to de-obfuscate some protections such as string encryption and control flow.
➡️Click to see few example of comparing virtualized functions with normal functions
Normal | Virtualized |
---|---|
Or |
Normal | Virtualized |
---|---|
Or |
Want to contribute to this project? Feel free to open a pull request.
.NETReactorSlayer is licensed under GPLv3.