Obfuscate
Paste PHP or JavaScript, choose expiry and restrictions, then download a ready-to-ship protected package.
Token controlled code protection
Obfuscate PHP and JavaScript with a modern no-eval loader, remote token validation, expiration rules, and optional IP or domain restrictions.
What changed
The default PHP output no longer uses eval(). It validates the license token first, decodes the payload, writes a protected runtime cache file, and loads it with require. JavaScript output uses a validated Blob script loader instead of runtime evaluation.
Core workflow
Paste PHP or JavaScript, choose expiry and restrictions, then download a ready-to-ship protected package.
Every protected file checks the inDark validator before loading the decoded payload.
Owners can decode their own protected files with the correct token for audit and recovery.
Security stance
Obfuscation is not a replacement for secure architecture, but it can protect commercial logic, reduce casual copying, and enforce license rules when paired with token validation and logging.
Limit generated packages to a defined number of days or issue long-lived tokens when needed.
Restrict execution to a server IP or a customer domain, enforced by the validator.
Track obfuscation and clarification actions without storing source code in logs.