Crates.io | obfustring |
lib.rs | obfustring |
version | 0.5.0 |
source | src |
created_at | 2023-01-30 12:42:40.581857 |
updated_at | 2023-01-30 12:42:40.581857 |
description | Procedural macro that obfuscates string literals with RNG at compile time. |
homepage | |
repository | https://github.com/Retoon/obfustring/ |
max_upload_size | |
id | 771757 |
size | 11,026 |
This crate provides a obfuscation macro for string literals. This makes it easy to protect them from common reverse engineering attacks like string reference lookup in something like a debugger or hex editor.
A string literal ""
is given as the input and converted into a [u8; str_size*2]
array literal that is then stored inside the binary. Every character is offset by a random amount. This offset is stored alongside the original data so it can be reconstructed.
[dependencies]
obfustring = "0.5.0"
The crate provides a obfustring!()
macro that takes in a single string literal.
use obfustring::obfustring;
let obfuscated_string = obfustring!("Hello obfustring!"); // <-- Won't show up in binaries or hex editors
let generic_string = String::from("Hello regular string!"); // <-- Will show up in binaries or hex editors
println!("obfuscated_string: {}", obfuscated_string);
println!("generic_string: {}", generic_string);
Note that you should never have any encryption/api keys or sensetive data hardcoded into your program. Though this macro would make it harder, it wouldn't absolutely hide it from someone looking hard enough. Stick to environment variables.
This project is licensed under the MIT license.