An open-source Java obfuscation tool that integrates with Ant and Gradle to protect Java applications.
yGuard is an open-source Java obfuscation tool that helps protect Java applications from reverse engineering by renaming classes, methods, and fields. It integrates with Ant and Gradle, allowing developers to easily incorporate obfuscation into their build processes. The tool is maintained by yWorks, known for their diagramming frameworks.
Java developers and teams who need to secure their applications against decompilation and reverse engineering, particularly those using Ant or Gradle for builds.
Developers choose yGuard for its simplicity, seamless integration with popular build tools like Ant and Gradle, and its open-source nature, providing a free alternative to commercial obfuscators.
The open-source Java obfuscation tool working with Ant and Gradle by yWorks - the diagramming experts
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
yGuard provides extensive Ant task and Gradle support, making it easy to incorporate obfuscation directly into existing Java build workflows, as highlighted in the README.
Includes thorough documentation and a wide range of examples in the examples directory, covering various use cases for practical guidance.
Available under an open-source license, offering a cost-effective alternative to commercial obfuscation tools without licensing fees.
Maintained by yWorks GmbH, a reputable company, ensuring ongoing development and reliability in the Java ecosystem.
Focuses primarily on renaming classes, methods, and fields, lacking advanced techniques like control flow obfuscation or encryption found in commercial tools.
Heavily integrated with Ant and Gradle; using it with Maven or other build systems requires manual configuration, adding complexity.
Requires detailed setup in build scripts, which can be error-prone and time-consuming for teams new to obfuscation or with complex projects.