Documentation Index
Fetch the complete documentation index at: https://mintlify.com/pw4k/ironbrew-2/llms.txt
Use this file to discover all available pages before exploring further.
Overview
IronBrew 2 uses theObfuscationSettings class to control obfuscation behavior. While the CLI currently uses default settings, understanding these options is essential for customizing obfuscation when using IronBrew 2 as a library.
The current CLI implementation uses default settings. To customize these options, you’ll need to modify the source code or use IronBrew 2 as a library in your own application.
Default Settings
When you run the CLI, it uses these default values:Available Options
String Encryption
Encrypts all string constants in the scriptWhen enabled, string literals are encrypted at compile time and decrypted at runtime, making the obfuscated code harder to analyze.
Selectively encrypts important string constantsA lighter alternative to full string encryption, targeting only sensitive strings.
Size of the decryption lookup tableUsed when string encryption is enabled. Larger values may improve performance but increase output size.
Control Flow Obfuscation
Applies control flow obfuscation transformationsRestructures the program’s control flow to make it harder to follow execution paths. This significantly increases complexity for reverse engineering.
Bytecode Options
Compresses the generated bytecodeReduces the size of embedded bytecode, making the output smaller and harder to analyze.
Preserves line number information in the outputWhen enabled, keeps debug line information. Useful for debugging but reduces obfuscation effectiveness.
Advanced Obfuscation
Applies mutation transformations to the bytecodeRandomly transforms bytecode instructions into equivalent but different forms.
Maximum number of mutation transformations to applyHigher values increase obfuscation strength but also increase processing time and output size.
Enables super operator transformationsCombines multiple simple operations into complex composite operations, making the VM harder to understand.
Maximum number of mini super operators to generateMini super operators are smaller composite operations. More operators increase variety and obfuscation strength.
Maximum number of mega super operators to generateMega super operators are larger, more complex composite operations that provide stronger obfuscation.