Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 23 Java Reverse Engineering Projects
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
GAppsMod
Tweak Google apps (e.g., Phone and Messages) to unlock hidden features (e.g., available only in some countries or on certain devices). Root is required.
-
skidfuscator-java-obfuscator
Public proof-of-concept obfuscator using the MapleIR framework designed by cts & bibl
-
ghidra-scripts
A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Let's see what our beloved software reverse engineering framework Ghidra has to show.
App tampering and repackaging can be performed by using reverse engineering or tampering tools, such as Apktool, dex2jar, etc.
Project mention: Turn on experimental flags of Google apps with GappsMod to enable new features (Root Required) | /r/fossdroid | 2023-06-07
Project mention: Help with Minecraft RAT decryption (idk where else to ask for help) | /r/technicalminecraft | 2023-06-07This is a RAT some1 tried to send me, could some1 reverse engineer to what discord webhook this is being sent to? I know for a fact that this is a discord webhook and I also know what obfuscator is being used (https://github.com/skidfuscatordev/skidfuscator-java-obfuscator/ this is the github link). Even more helpful would be if some1 could teach me how to deobfuscate things cuz Im kind of a noob. The link to the whole Jar file is https://drive.google.com/file/d/1WGvYfHeEYStsPmygwnGlCmnNyVAoB533/view?usp=sharing *Keep in mind this is a Trojan* The webhook is normally entered in the json.JSONrareException class. Any help is appreciated thanks! I tried looking at the decompiled code but again it is obfuscated and idk how to deobfuscate so plz help ty. If you dont want to download and decompile the rat yourself (thats totally understandable) I have inserted where I think are the important stuff here: https://pastebin.com/hEzDAdcg and the full code here: https://pastebin.com/aENGYHwn The variable I'm trying to decrypt is webthingy. It should be a link to a discord webhook.
See https://github.com/m35/jpsxdec
Java Reverse Engineering related posts
-
TryHackMe- Compiled
-
OpenAI is working with the US military now
-
Show HN: A Ghidra extension that turns programs back into object files
-
Ghidra 11.0 Released
-
NSA releases Ghidra version 10.3.3
-
Ghidra 10.3.2 released!
-
Ghirda 10.3.2 released!
-
A note from our sponsor - InfluxDB
www.influxdata.com | 10 May 2024
Index
What are some of the best open-source Reverse Engineering projects in Java? This list will help you:
Project | Stars | |
---|---|---|
1 | ghidra | 47,857 |
2 | Apktool | 18,958 |
3 | Recaf | 5,574 |
4 | simplify | 4,367 |
5 | fernflower | 3,283 |
6 | bindiff | 1,896 |
7 | SchemaCrawler | 1,554 |
8 | BinAbsInspector | 1,519 |
9 | cp-ddd-framework | 1,086 |
10 | GAppsMod | 1,069 |
11 | OpenPods | 905 |
12 | JByteMod-Beta | 817 |
13 | skidfuscator-java-obfuscator | 557 |
14 | jpsxdec | 439 |
15 | Deobfuscator | 312 |
16 | efiSeek | 299 |
17 | SkidSuite | 296 |
18 | Ghidra-Switch-Loader | 268 |
19 | GhidraEmu | 267 |
20 | AndroidLibrary | 241 |
21 | ghidra-scripts | 214 |
22 | GhidRust | 200 |
23 | allsafe | 190 |
Sponsored