Janmm14
Janmm14
Using a bijective function for identifier renaming and renaming all identifiers makes virtual mapped bytecode not experience more mutations than regular bytecode.. The target identifier could add prefix for field/class/method...
I was just going to create an issue for inverse mapping application. To make changes in "clean" state and then reobfuscate for reflection to work again.
Why use size_t at all for slots when we know slot index will always fit into a single byte (or maybe into a short to be on the safe side).
@tonitch here the wiki.vg page containing the urls: https://wiki.vg/Protocol_Encryption
just use java-deobfuscator for that
google search showed https://github.com/SpartanB312/Grunt
such a general check shouldn't be named botnet downloader in my opinion
When UI is available (check awt headless or so) and no arguments are given, we should let it start the gui, so ppl only have to doubleclick. We could check...
u know project is kinda dead?
try to use 5.0.14 for non 1.17 servers