eitco-mavenizer
Helps you to find or define Maven UIDs for any JAR file and generate corresponding artifact install scripts. (by eitco)
threadtear
Multifunctional java deobfuscation tool suite (by GraxCode)
eitco-mavenizer | threadtear | |
---|---|---|
1 | 3 | |
13 | 860 | |
- | - | |
1.7 | 0.0 | |
about 1 year ago | about 1 year ago | |
Java | Java | |
MIT License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
eitco-mavenizer
Posts with mentions or reviews of eitco-mavenizer.
We have used some of these posts to build our list of alternatives
and similar projects.
threadtear
Posts with mentions or reviews of threadtear.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-27.
-
does decompiling a .jar file execute it?
If you're very paranoid, Threadtear does have some amount of protection against potential code execution when decompiling, although it hasn't been updated in a while and it's still always a risk (albeit one I never personally encountered). If you suspect that the file you want to decompile does have a way to execute code when decompiling it, you could try using a virtual machine for some added protection.
-
Most likely a new scam
I used recaf for the plugin.yml, I used deobfuscator to remove the obfuscation, then I used threadtear for decompilation. I use threadtear pretty much always, but it's allatori deobfuscation is somewhat lacking which is why I used a separate program. Also it does not show resources in the jar, which is why I had to use recaf.
-
HOW DO I SCAN A JAR FOR RATS?
learn java then get https://github.com/GraxCode/threadtear read all files be weary if its obfuscated