MQL Encrypt - Cloud MQL4 code obfuscator

Media Project 2

MQLEncrypt can obfuscate MQL code in several ways, such as pruning unused code by removing code that can't be executed and block comments. It also mangles the names of the functions and variables to scrambled characters through name mangling. Additionally, it encrypts strings, making it difficult to decipher the code by tracing references to a known string.

MQLEncrypt comes with tamper protection that can inject self-protection into the user's EA/Indicator. In case of tampering, the user's EA/Indicator can be removed from the chart or may cause random crashes. Moreover, it can notify the user of discovered tampering (still under construction).

MQLEncrypt also includes dummy code insertion that adds extra code to the mql code without affecting the logic of the user's EA/Indicator, thus making reverse-engineered code significantly more difficult to understand.

mqlencrypt-sample
Here's a sample of a source file that has been obfuscated

mqlencrypt-backend
MQLEncrypt - C# Backend

When the user uses the MQLEncrypt service, they'll interact with two main components.

The frontend is built with the Laravel framework and is where the user will submit their source files for obfuscation. Once the user has uploaded their files,

the backend, which is developed using C#.NET, takes over the process of obfuscation. The user's MQL source file will be added into a queue, and this queue will be processed using multithreaded functions for efficient and faster obfuscation.

The queued files will be compiled and error-checked by the MQL compiler, ensuring that any coding errors are promptly notified to the user for resolution. Upon successful compilation, the backend initiates the obfuscating functions, providing the user with a securely obfuscated version of their source file that has also been compiled and thoroughly error-checked to ensure its integrity and correctness.

Description

MQLEncrypt is an MQL4 obfuscator that helps protect MQL4 applications from unauthorized modifications and reverse engineering by limiting access to source code.

It provides users with a variety of obfuscation features such as tamper protection, dummy code insertion, string encryption, and declarative obfuscation.

Built With:


Notes:

This product is not available for purchase, but you might come across similar products in the shop.

Explore the Shop