Automated Source Code Protection


Ready-Made obfuscators for converting plain text code into unreadable, yet executable scripts !


AtShai.com provides the number #1 comprehensive solution for obfuscating and protecting source code of multiple different scripting languages. We specialize in the automated and customized development of dynamic solutions for source code security. Our unique innovative methodology provides script developers complete control over their intellectual property. We understand it is often not enough to just obfuscate a code. That's a big enough task by itself. In additional to that however, we know you may also wish to monitor where your code is being used, how it is being used and how frequently it is being attacked. We provide mechanisms that delivers this convenience for you, hassle free. Currently, we support the following scripting languages: Shell/Bash, Perl, Python, PHP, Ruby, Powershell, JavaScript, R/Rmarkdown - IF your language of choice isn't listed, don't worry. Just reach out to us to submit an obfuscator development request!

Comprehensive Source Code Protection & Surveillance

Secure, Monitor & Protect Sensitive Scripts - Shield your Source Code from Prying Eyes, Track hack attacks on all protected scripts



Obfuscation/Encryption

Complete transformation of plain text code into incomprehensible, yet executable code

Metrics

Utilize graphs to keep track of the number of scripts protected, and when. Visualize frequency of attacks on your protected scripts

Duplication Prevention

Protect against unauthorized duplications of your script. Ensure obfuscated scripts can never be utilized under names different from the ones given at the time of obfuscation

OS Compatibility

Obfuscated scripts will work on all supported platforms including SunOS, Linux, FreeBSD, Mac OS X and Windows



License Enforcement

Assign expiration dates to your protected scripts. Ensure licensed scripts do not run past specific dates.

User Accesses

Specify and regulate which users are allowed to run protected scripts.

Host Accesses

Control which hosts are allowed to run your scripts.

Remote Regulation

Retain the ability to remotely enable or disable functionalities/capabilities of protected scripts.



Tamper Resistance

Ensure your protected code cannot be altered. Any foreign change will cause the obfuscated code to abort execution and register the failed hack attempt.

Block Vulnerabilty Scans

Obfuscated version of your scripts will bear no resemblance to the original plain text version; prevents hackers from getting any 'brilliant' ideas for attacks.

CI/CD Integration

Smooth integration with your existing pipeline. Just point the obfuscator to the directories/files you wish protect.

Containers/Docker

Licensed version of the obfuscator is a command line tool designed to work seamlessly with Docker images and other container technologies





What is Source Code Protection?

Source code protection is the process by which a plain text code is converted into, ideally, an irreversible obfuscated form, which is unreadable to humans. In this illegible format, an adequately protected code should prove a formidable obstacle for any hacker, regardless of expertise. In this modern day and age, it has become clear that source code security needs to be prioritized, considering the endless news reports of data breaches at major companies world wide. In addition to protecting plain text code through obfuscation and encryption, it is also essential to retain and maintain visibility on where your code is being utilized and by whom.

Common justifications for Source Code Protection:

  • Overall Security - Safe guard any sensitive data stored in scripts, Protect Intellectual Property!
  • License Management - Ability to assign an irreversible period of validity to protected scripts and the option to remotely regulate such scripts
  • Centralized Administration - Remote disablement/enablement of protected scripts's functions/features, License Enforcement
  • User Access Control - Define a list of users authorized to execute obfuscated scripts
  • Host Access Control - Define a list of hosts allowed to run protected scripts
  • Monitoring/Metrics - Where are my scripts right now? See records of hack attempts on your protected source code
  • Duplication Prevention - Prevent obfuscated scripts from functioning if original script name (given at the time of obfuscation) is ever altered
  • Tamper Resistance - Auto self-aborts when hack attempts are detected on the contents of a protected script
  • Modification Prevention - Ensures the protected script (in its obfuscated format) can never be modified!
  • Prevent Vulnerability Scans - Protect against exploitative scans designed to find source code vulnerabilities



Source Code Protection (online submissions)

Upload plain text scripts to our online Web Portal for a quick and easy automated obfuscation process!



Shell

(Online Shell Obfuscator)

Buy Demo

Perl

(Online Perl Obfuscator)

Buy Demo

Python

(Online Python Obfuscator)

Buy Demo

Php

(Online Php Obfuscator)

Buy Demo


Ruby

(Online Ruby Obfuscator)

Buy Demo

R & RMarkdown

(Online R Obfuscator)

Buy Demo

Powershell

(Online Powershell Obfuscator)

Buy Demo

JavaScript

(Online JavaScript Obfuscator)

Buy Demo


Impossible Questions now Answered!

Where is my script being used right now? Is it being used by expected users, or has it been pirated? Who pirated it? How frequently is my script being hit with hack attacks???

Tamper Resistance

Before the arrival of AtShai.com, it was generally believed that source code could not be protected against unauthorized changes. The thinking was that; once a user gains read access to the script file, he can do with it as he pleases. Now, that is no longer true. We demolished that belief. The AtShai Obfuscator ensures your script's source code is thoroughly obfuscated, well hidden and never available for the public to modify or tamper with. And, when attempts are made to figure out how your code works, we provide numerous tactics that can be enabled to fight back and record the attackers!

Safeguard Proprietary Code

With your code safely obfuscated, you are now free to sell and/or share it publicly without having to worry about potential theft of intellectual property, illegally prolonged usage of your software or vulnerability scans!

Surveillance/Code Monitoring

Once your obfuscated scripts have been shared with the outside world, this feature (if enabled) allows you to gather metrics on how they are being used and by whom. This feature is especially important if you have extremely sensitive scripts that cannot be allowed to fall into the wrong hands. Once a script is obfuscated with this feature enabled, it will automatically dispatch messages to our central servers with information pertaining to the attacker. And if the attacker blocks external calls from his host server, your obfuscated script can be configured to self-destruct!





Source Code Protection (onprem license)

Download your own copy of the AtShai Obfuscation tool - Use on as many servers as necessary!



Shell

Onprem access (shell obfuscator)

Buy Demo

Perl

Onprem access (perl obfuscator)

Buy Demo

Python

Onprem access (python obfuscator)

Buy Demo

Php

Onprem access (php obfuscator)

Buy Demo


Ruby

Onprem access (ruby obfuscator)

Buy Demo

R

Onprem access (r obfuscator)

Buy Demo

Powershell

Onprem access (powershell obfuscator)

Buy Demo

JavaScript

Onprem access (JavaScript obfuscator)

Buy Demo