Hello sir, hope you're having a great day.
I've been reversing applications for two years now, Im able to determine which application is good and which one is not.
I can share you via chat my personal portfolio where I've shared open source a obfuscator that used VIRTUALIZATION technique, highest level of protection avaliable.
I can achieve your needs too, I'll need some more details about the whole project but this is what I can do:
1) Manual obfuscation (strongest as it does not follow any pattern, therefore needs manual deobfuscation).
2) Var renaming, meaning you'll still be able to use the application even after obfuscation.
3) Code puzzling, chaing the flow of the application and making it impossible to read.
4) Constant encryption and mutation.
5) File shielden.
6) Proxy calls.
Further information and details can be talked via the chat, I'll be waiting for you.. Have a nice day.