Logo

Z5 encryption

New generation PHP componentless source code protection scheme

Technical advantages

TECHNICAL ADVANTAGES

VM based protection

VM-Based Protection
Are you still using obfuscation based "encryption"? The traditional encryption scheme only destroys the readability, and even worse, it just covers a shell, so it is not technically difficult to crack it. Based on VM protection technology, we compile PHP into assembly like language code (bytecode), and then build a virtual machine with PHP to achieve complete protection of PHP code.

High strength bytecode protection

High-intensity Bytecode Protection
Adding only one layer of virtual machine is not powerful enough, because it is only a translation of the original logic. However, people can have unlimited reverie by re encrypting the byte code, breaking up the program code, and reorganizing the execution logic. It is easy to break a cup, but it is extremely difficult to restore the appearance of the cup itself most of the time.

Strong compatibility

Strong Capability
It does not need any components, and can run in an environment that supports PHP 5.2 - 7.4. It perfectly solves the pain points of various CMS secondary development and template copyright protection. Based on PHP 7.2, it supports most of the syntax it supports. Most of the code does not need to be modified when encrypting the core function library.