Crackme
JByteMod-Beta
Our great sponsors
Crackme | JByteMod-Beta | |
---|---|---|
1 | 1 | |
4 | 817 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | almost 3 years ago | |
C | Java | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Crackme
-
Help me understand this simple reversed code
Source: https://github.com/MrEmpy/Crackme/blob/main/TryCrackMe/trycrackme.c
JByteMod-Beta
-
Online Mode
First go grab JByteMod from their GitHub https://github.com/GraxCode/JByteMod-Beta/releases Download the latest zip version (currently JByteMod-1.8.2.zip) and unzip the contents to somewhere on your computer. Run the JByteMod-1.8.2.jar you just unzipped. (You need a Java RTE of your choice) Menu File > Load > Select your server jar file Menu Search > Search LDC > Find "www" Go to the Search tab to see the results and find the line with: "http://www.minecraft.net/game/checkserver.jsp?user=" Right click on it > "Jump to Declaration" Now you should see the bytecode listed in the Editor tab. Find the line again and left click on it. Then right click > Edit Change "www" to "session" and click OK Menu File > Save as > save it as a jar file with a new name eg "Server_online.jar" Replace your existing server jar with the new edited online jar in your server and edit your server.properties file to have online-mode=true instead of false. Done!
What are some alternatives?
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Project-Poseidon-Uberbukkit - Fork of Poseidon providing Bukkit #1060 to older Betas (b1.0-b1.7.3)
0x02-ARM-32-Hacking-Int - ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
fernflower - Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
Hacking-Windows - A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Recaf - The modern Java bytecode editor
fujihack - Reverse engineering Fujifilm firmware
bytecode-viewer - A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
pyhecdss - Python 3 interface to the HECLIB for 64 bit using SWIG. Primarily to provide access to HEC-DSS format
JaCoCo - :microscope: Java Code Coverage Library
Deobfuscator - Some deobfuscator for java lol
robovm - Ahead of time compiler for JVM bytecode targetting iOS, Mac OSX and Linux