threadtear
threadtear copied to clipboard
Multifunctional java deobfuscation tool suite
When you save the jar file it basically downloads the original file you inserted and it is not deobfuscated at all, while in the editor it is all nicely deobfuscated
If you know an obfuscator that has no execution class yet, or have an idea what could be useful for deobfuscation and analysis, make your own execution! Just extend me.nov.threadtear.execution.Execution,...
For autostyle to work an eclipseformat configuration should be supplied. If done the following line should be replaced. https://github.com/GraxCode/threadtear/blob/800f79a9683d870d66237cf2fbfe7af5564cd107/build.gradle.kts#L12 Change to ````kotlin val skipAutostyle by props() ````
**Describe what's not working** The jar is obfuscated by ZKM (unknown version) and has string encryption + reference obfuscation applied. Only the calls to the string decryption method are encrypted....
can't deobuscate jar file. Obfuscation is similar to zkm. jar file: https://workupload.com/file/bFVafRnQCEd
Saw your warning @ https://github.com/GraxCode/threadtear#warning and thought it would be cool if people could see what an example of a successful arbitrary code execution would look like on threadtear as...
The radon string obfuscation works with cipher and some random chinese letters x3 Here one obfuscated jar: https://workupload.com/file/H5AnKeDx6yg
Looks like this all my strings just impossible to grab. ![image](https://user-images.githubusercontent.com/37124239/188236308-6c2b0d6a-4b90-4021-8019-3bdfd08b9b3f.png)
Fix support for Java 18, also update darklaf to latest versions.
Exception in thread "Execution-Thread" java.lang.NoClassDefFoundError: com/craftrise/cT at java.lang.Class.getDeclaredMethods0(Native Method) at java.lang.Class.privateGetDeclaredMethods(Unknown Source) at java.lang.Class.privateGetMethodRecursive(Unknown Source) at java.lang.Class.getMethod0(Unknown Source) at java.lang.Class.getMethod(Unknown Source) at me.nov.threadtear.execution.zkm.DESObfuscationZKM.invokeVM(DESObfuscationZKM.java:305) at me.nov.threadtear.execution.zkm.DESObfuscationZKM.decryptReferences(DESObfuscationZKM.java:175) at java.util.HashMap$ValueSpliterator.forEachRemaining(Unknown Source) at java.util.stream.ReferencePipeline$Head.forEach(Unknown...