ByteHide Documentation

Find guides and references for securing your applications across every platform.

Getting started

Explore guides and API references for every ByteHide module and platform.

Modules

Shield

Code obfuscation and protection against reverse engineering. Available for .NET, JavaScript, Android, iOS, and Java.

Secrets

AI-powered secret detection and secure credential management. Available for .NET, JavaScript, Java, Go, Python, and PHP.

Monitor

Runtime Application Self-Protection (RASP) with real-time threat detection. Available for .NET, Android, and iOS.

Logs

Centralized logging with advanced filtering, analytics, and team collaboration. Available for .NET, JavaScript, Java, Go, and Python.

Radar

Static analysis (SAST), dependency scanning (SCA), and secret detection across your repositories.

AI

AI-powered security agent with MCP integration, AutoFix, and runtime correlation.


What is ByteHide?

Most security platforms are a collection of isolated tools that barely talk to each other. They scan your code, dump a list of findings, and leave you to figure out the rest. The result? Hundreds of alerts, tons of false positives, bad prioritization, and developers wasting time on noise instead of shipping.

ByteHide takes a different approach. Every module in the platform is connected. Static analysis, secret scanning, runtime protection, and logging all feed into the same context. When Radar finds a vulnerability in your code, Monitor can tell you if it's actually being exploited in production. That means fewer false positives, better prioritization, and fixes that actually matter.

On top of that, ByteHide automates remediation. AI AutoFix doesn't just flag problems. It generates validated pull requests that fix vulnerabilities across your repository. And if you're using AI coding agents like Claude, Cursor, or Copilot, ByteHide plugs directly into them through MCP so your code is secure as you write it.

For teams that need runtime protection, Monitor adds a RASP layer that defends your application against tampering, debugging, hooking, and injection attacks in real time. And Logs gives you a full compliance and traceability layer, so you have a clear audit trail of everything that happens across your services.

Built for developers, designed to stay out of your way, and connected end-to-end.

AI-Powered Security

ByteHide AI correlates findings across the entire platform. It connects what happens in your code with what happens in production, prioritizes what actually matters, and fixes issues automatically.

MCP Integration

Connect ByteHide to Claude, Cursor, VS Code, Windsurf, or GitHub Copilot. Your AI agent becomes security-aware in real time.

AutoFix

AI-generated pull requests that fix vulnerabilities across your entire repository, validated before submission.

Runtime Correlation

Connect static findings with real attack data. Know which vulnerabilities are actually being exploited in production.

Agent Skills

Open-source security toolkit for AI coding agents. 9 production-ready skills covering OWASP Top 10 and more.

Security Across the Lifecycle

Develop → Release → Runtime

  • Develop: Radar analyzes your code (SAST), scans dependencies (SCA), and detects leaked secrets. Secrets manages your credentials automatically. AI AutoFix generates validated PRs to remediate findings.
  • Release: Shield obfuscates and protects your application before distribution, encrypting code, strings, and resources against reverse engineering.
  • Runtime: Monitor defends your app in production against tampering, debugging, hooking, and injection attacks. Logs gives you full traceability and compliance across all your services.

Cloud Applications

If you're building APIs, backends, or microservices, security starts while you write code. Radar scans every commit for vulnerabilities (SAST), insecure dependencies (SCA), and leaked secrets before they reach production. When it finds something, AI AutoFix generates a validated pull request so you don't have to stop what you're doing to remediate it manually. Secrets replaces hardcoded credentials with encrypted, centrally managed values that rotate automatically and never end up in your repository.

But catching issues in development is only half the picture. In production, your application is exposed to attacks that no static scanner can predict. Traditional WAFs sit at the perimeter, inspecting traffic from outside, which means they lack application context and generate a high volume of false positives. Monitor works differently: it runs inside your application as a RASP layer, so it understands the actual behavior of your code and your users. It can detect zero-day attacks based on anomalous patterns, correlate them with known vulnerabilities from Radar, and automatically block threats in real time while you work on a permanent fix. Logs adds full traceability and structured audit trails across all your services, so you have the compliance and observability layer your team needs.

Mobile Applications

Mobile apps face a fundamentally different threat: once you ship a binary to a user's device, attackers can decompile it, reverse-engineer your logic, extract API keys, and tamper with its behavior. This is especially critical for banking, fintech, and any app that handles sensitive data on-device.

Shield is the first line of defense. It applies code obfuscation, string encryption, control flow flattening, and resource encryption to make reverse engineering as difficult as possible. It also includes basic runtime checks like anti-debug and tamper detection built into the protected binary.

For apps that need a stronger runtime defense, Monitor adds an advanced RASP layer on top of Shield. It detects rooted or jailbroken devices, hooking frameworks, debugging attempts, and injection attacks in real time. It can block compromised devices, notify your backend, and feed all of that data back into the platform so your security team has full visibility of what's happening on every device in the field.

If your stack spans both cloud and mobile, the entire platform works together. Findings from Radar, protections from Shield, runtime data from Monitor, and logs from every service feed into the same context.

Protect a Mobile App Before Publishing

Why any APK or IPA can be decompiled in minutes, and how to protect it before the store.

Set Up a Security Pipeline

End-to-end security from the first commit to production.

Secure API Keys and Secrets

Detect and replace hardcoded credentials across your codebase.

All Guides

Practical guides covering obfuscation, RASP, CI/CD security, OWASP Top 10, and more.