SkidSuite
A collection of java reverse engineering tools and informational links (by GenericException)
threadtear
Multifunctional java deobfuscation tool suite (by GraxCode)
SkidSuite | threadtear | |
---|---|---|
2 | 3 | |
296 | 860 | |
- | - | |
5.5 | 0.0 | |
11 months ago | about 1 year ago | |
Java | Java | |
- | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SkidSuite
Posts with mentions or reviews of SkidSuite.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Open-Obfuscator: A free and open-source solution for obfuscating mobile applications.
Check the android page: https://github.com/GenericException/SkidSuite
-
An Introduction To Android Malware Reverse Engineering
There's some other useful Android reversal tools listed on: https://github.com/GenericException/SkidSuite/blob/master/android.md
threadtear
Posts with mentions or reviews of threadtear.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-27.
-
does decompiling a .jar file execute it?
If you're very paranoid, Threadtear does have some amount of protection against potential code execution when decompiling, although it hasn't been updated in a while and it's still always a risk (albeit one I never personally encountered). If you suspect that the file you want to decompile does have a way to execute code when decompiling it, you could try using a virtual machine for some added protection.
-
Most likely a new scam
I used recaf for the plugin.yml, I used deobfuscator to remove the obfuscation, then I used threadtear for decompilation. I use threadtear pretty much always, but it's allatori deobfuscation is somewhat lacking which is why I used a separate program. Also it does not show resources in the jar, which is why I had to use recaf.
-
HOW DO I SCAN A JAR FOR RATS?
learn java then get https://github.com/GraxCode/threadtear read all files be weary if its obfuscated
What are some alternatives?
When comparing SkidSuite and threadtear you can also consider the following projects:
skidfuscator-java-obfuscator - Public proof-of-concept obfuscator using the MapleIR framework designed by cts & bibl
Deobfuscator - Some deobfuscator for java lol
obfuscator - A java obfuscator (GUI)
deobfuscator - The real deal
Recaf - The modern Java bytecode editor
Theia - A Kotlin program used to analyze and discover backdoors in Minecraft Java 1.12.2 forge mods
unfuck - Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker
SSVM - Java VM running on a JVM
yGuard - The open-source Java obfuscation tool working with Ant and Gradle by yWorks - the diagramming experts
SkidSuite vs skidfuscator-java-obfuscator
threadtear vs skidfuscator-java-obfuscator
SkidSuite vs Deobfuscator
threadtear vs Deobfuscator
SkidSuite vs obfuscator
threadtear vs deobfuscator
SkidSuite vs Recaf
threadtear vs Theia
SkidSuite vs unfuck
threadtear vs Recaf
SkidSuite vs SSVM
threadtear vs yGuard