Based on latest technologies and the latest C++ standard, our antispy obfuscation library protects your code – on all platforms.

Attackers can extract sensitive information by just analysing your product.

This information is then used to hack, break encryption, make data leaks or steal some sort of information that damages your business.

antispy sets the initial hurdle of a hacker or reverse engineer so high that the cost and effort of an attack on your product does not justify the result.

Feature Matrix

antispy is modularized and supports a large number of platforms since it supports all modern compilers and toolchains for easy integrations.

To counter-attack statical analysis, we support the encryption of pointers, data, primitives, and your control flow by just changing a few lines of code.

Metadata and useful information are extracted by attackers through strings – in a binary or interpreted code. With encrypted strings during compiling the problem is solved.

In our C/C++ modules, we support code virtualization. Critical code is thus optimally protected against reverse engineering and attacks.

Code Example

#include <antispy/libantispy.h>

int main(int, char **) {
   // String which is not protected.
   printf ("[LOG]: Initialize super awesome program.\n");

   // Encrypted log strings.
   printf (TEXT ("[LOG]: Open database.\n"));
   printf (TEXT ("[LOG]: Decrypt database.\n"));
   printf (TEXT ("[LOG]: Get values from database.\n"));
   printf (TEXT ("[LOG]: Connect to service.\n"));
   printf (TEXT ("[LOG]: Download metadata.\n"));
   printf (TEXT ("[LOG]: Open GUI..\n"));

  // This creates and holds an encrypted string in memory.
  auto encrypted = OSTR("Encrypted very long string with a powerful meaning.");

  // ..and it is only decrypted while accessing it.
  std::cout << static_cast<::std::basic_string<char>>(encrypted).c_str()
            << std::endl;
  return 0;