Caesium
A Java bytecode obfuscator (by sim0n)
threadtear
Multifunctional java deobfuscation tool suite (by GraxCode)
Caesium | threadtear | |
---|---|---|
1 | 3 | |
273 | 860 | |
- | - | |
0.0 | 0.0 | |
about 1 year ago | about 1 year ago | |
Java | Java | |
MIT License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Caesium
Posts with mentions or reviews of Caesium.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-31.
threadtear
Posts with mentions or reviews of threadtear.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-27.
-
does decompiling a .jar file execute it?
If you're very paranoid, Threadtear does have some amount of protection against potential code execution when decompiling, although it hasn't been updated in a while and it's still always a risk (albeit one I never personally encountered). If you suspect that the file you want to decompile does have a way to execute code when decompiling it, you could try using a virtual machine for some added protection.
-
Most likely a new scam
I used recaf for the plugin.yml, I used deobfuscator to remove the obfuscation, then I used threadtear for decompilation. I use threadtear pretty much always, but it's allatori deobfuscation is somewhat lacking which is why I used a separate program. Also it does not show resources in the jar, which is why I had to use recaf.
-
HOW DO I SCAN A JAR FOR RATS?
learn java then get https://github.com/GraxCode/threadtear read all files be weary if its obfuscated
What are some alternatives?
When comparing Caesium and threadtear you can also consider the following projects:
obfuscator
skidfuscator-java-obfuscator - Public proof-of-concept obfuscator using the MapleIR framework designed by cts & bibl
bytecode-viewer - A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Deobfuscator - Some deobfuscator for java lol
Recaf - The modern Java bytecode editor
deobfuscator - The real deal
Theia - A Kotlin program used to analyze and discover backdoors in Minecraft Java 1.12.2 forge mods
obfuscator - A java obfuscator (GUI)
pyminifier - Pyminifier is a Python code minifier, obfuscator, and compressor.
yGuard - The open-source Java obfuscation tool working with Ant and Gradle by yWorks - the diagramming experts
Caesium vs obfuscator
threadtear vs skidfuscator-java-obfuscator
Caesium vs bytecode-viewer
threadtear vs Deobfuscator
Caesium vs Recaf
threadtear vs deobfuscator
Caesium vs skidfuscator-java-obfuscator
threadtear vs Theia
Caesium vs obfuscator
threadtear vs Recaf
Caesium vs pyminifier
threadtear vs yGuard