• Services
    • Application & Network Penetration Testing
      • AI and LLM Penetration Testing Services iconAI and LLM Penetration Testing Services
      • Web Penetration Testing Services iconWeb Penetration Testing Services
      • Mobile Penetration Testing Srevices iconMobile Penetration Testing Srevices
      • API Penetration Testing Services iconAPI Penetration Testing Services
      • Internal Network Penetration Testing Services iconInternal Network Penetration Testing Services
      • External Network Penetration Testing Services iconExternal Network Penetration Testing Services
      • PCI DSS Penetration Testing Services iconPCI DSS Penetration Testing Services
    • Adversary Simulation
      • Red Teaming Services & Operations iconRed Teaming Services & Operations
      • Threat-Led Penetration Testing Services (TLPT) iconThreat-Led Penetration Testing Services (TLPT)
    • Embedded and IoT Pentesting
      • loT Penetration Testing Services iconloT Penetration Testing Services
      • Embedded Systems Penetration Testing Services iconEmbedded Systems Penetration Testing Services
    • Cloud and Container Security
      • Cloud Penetration Testing Services iconCloud Penetration Testing Services
      • Container Penetration Testing Services iconContainer Penetration Testing Services
    • Consulting and Application Security
      • Threat modeling for agile teams iconThreat modeling for agile teams
      • Managed application security iconManaged application security
      • DevSecOps consulting iconDevSecOps consulting
  • Company
  • Career
  • Blog
Contact us
Contact us

Home Howto

Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques

  • All Posts
  • Article
  • Case Studies
  • All Categories
  • AppSec
  • Cloud/Container Security
  • Company updates
  • Compliance
  • Howto
  • Security Research
  • Uncategorized
  • Vulnerabilities
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
Howto
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
by Olga Kovalenko
March 18, 2025 8 min read
Read more
Penetration Testing Checklist: How to Prepare for a Penetration Test
Howto
Penetration Testing Checklist: How to Prepare for a Penetration Test
by Olga Kovalenko
January 17, 2025 6 min read
Read more
Red Team vs. Blue Team: How They Help Each Other
Howto
Red Team vs. Blue Team: How They Help Each Other
by Olga Kovalenko
October 31, 2024 9 min read
Read more
Network Penetration Testing: All You Need to Know
Howto
Network Penetration Testing: All You Need to Know
by Olga Kovalenko
October 17, 2024 9 min read
Read more
What Is API Security? Complete Guide & Best Practices
Howto
What Is API Security? Complete Guide & Best Practices
by Igor Kantor
September 5, 2024 10 min read
Read more
Top Container Security Vulnerabilities and How to Solve Them
Howto
Top Container Security Vulnerabilities and How to Solve Them
by Igor Kantor
July 26, 2024 8 min read
Read more
Main Cloud Security Challenges and How to Solve Them
Howto
Main Cloud Security Challenges and How to Solve Them
by Igor Kantor
July 19, 2024 12 min read
Read more

Services

API Penetration Testing Cloud Penetration Testing Container Penetration Testing Internal Network Penetration Testing External Network Penetration Testing IoT pentest Mobile Penetration Testing AI and LLM Penetration Testing Services Threat Modeling For Agile Teams Managed Application Security Penetration Testing Services Web Penetration Testing PCI DSS Penetration Testing Red Teaming DORA Penetration Testing Embedded Penetration Testing

More info

About Us Blog Career Privacy Policy

Contacts

al. Tadeusza Rejtana 53a /203, 35-326 Rzeszów, Poland +48459569049 [email protected]

Join us

Close
Contact Form