yGuard
The open-source Java obfuscation tool working with Ant and Gradle by yWorks - the diagramming experts (by yWorks)
threadtear
Multifunctional java deobfuscation tool suite (by GraxCode)
Our great sponsors
yGuard | threadtear | |
---|---|---|
1 | 3 | |
336 | 860 | |
2.1% | - | |
5.0 | 0.0 | |
2 months ago | about 1 year ago | |
Java | Java | |
MIT License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
yGuard
Posts with mentions or reviews of yGuard.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-31.
threadtear
Posts with mentions or reviews of threadtear.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-27.
-
does decompiling a .jar file execute it?
If you're very paranoid, Threadtear does have some amount of protection against potential code execution when decompiling, although it hasn't been updated in a while and it's still always a risk (albeit one I never personally encountered). If you suspect that the file you want to decompile does have a way to execute code when decompiling it, you could try using a virtual machine for some added protection.
-
Most likely a new scam
I used recaf for the plugin.yml, I used deobfuscator to remove the obfuscation, then I used threadtear for decompilation. I use threadtear pretty much always, but it's allatori deobfuscation is somewhat lacking which is why I used a separate program. Also it does not show resources in the jar, which is why I had to use recaf.
-
HOW DO I SCAN A JAR FOR RATS?
learn java then get https://github.com/GraxCode/threadtear read all files be weary if its obfuscated
What are some alternatives?
When comparing yGuard and threadtear you can also consider the following projects:
proguard - ProGuard, Java optimizer and obfuscator
skidfuscator-java-obfuscator - Public proof-of-concept obfuscator using the MapleIR framework designed by cts & bibl
FizzBuzz Enterprise Edition - FizzBuzz Enterprise Edition is a no-nonsense implementation of FizzBuzz made by serious businessmen for serious business purposes.
Deobfuscator - Some deobfuscator for java lol
Theia - A Kotlin program used to analyze and discover backdoors in Minecraft Java 1.12.2 forge mods
jsweet - A Java to JavaScript transpiler.
deobfuscator - The real deal
obfuscator - A java obfuscator (GUI)
Recaf - The modern Java bytecode editor
PipelinR - PipelinR is a lightweight command processing pipeline ❍ ⇢ ❍ ⇢ ❍ for your Java awesome app.
yGuard vs proguard
threadtear vs skidfuscator-java-obfuscator
yGuard vs FizzBuzz Enterprise Edition
threadtear vs Deobfuscator
yGuard vs skidfuscator-java-obfuscator
threadtear vs Theia
yGuard vs jsweet
threadtear vs deobfuscator
yGuard vs obfuscator
threadtear vs Recaf
yGuard vs PipelinR
threadtear vs obfuscator