JD-GUI Logo

JD-GUI

0
Free
Visit Website

JD-GUI is a standalone graphical utility that displays Java source codes of ".class" files. You can browse the reconstructed source code with the JD-GUI for instant access to methods and fields. How to build JD-GUI ? > git clone https://github.com/java-decompiler/jd-gui.git > cd jd-gui > ./gradlew build generate : "build/libs/jd-gui-x.y.z.jar" "build/libs/jd-gui-x.y.z-min.jar" "build/distributions/jd-gui-windows-x.y.z.zip" "build/distributions/jd-gui-osx-x.y.z.tar" "build/distributions/jd-gui-x.y.z.deb" "build/distributions/jd-gui-x.y.z.rpm" How to launch JD-GUI ? Double-click on "jd-gui-x.y.z.jar" Double-click on "jd-gui.exe" application from Windows Double-click on "JD-GUI" application from Mac OSX Execute "java -jar jd-gui-x.y.z.jar" or "java -classpath jd-gui-x.y.z.jar org.jd.gui.App" How to use JD-GUI ? Open a file with menu "File > Open File..." Open recent files with menu "File > Recent Files" Drag and drop files from your file explorer

FEATURES

ALTERNATIVES

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

FSF is a modular, recursive file scanning solution that enables analysts to extend the utility of Yara signatures and define actionable intelligence within a file.

A tool for identifying and analyzing Java serialized objects in network traffic

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

FLARE-VM is a collection of software installation scripts for Windows systems designed for setting up and maintaining a reverse engineering environment on a virtual machine.

A collection of YARA rules for public use, built from intelligence profiles and file work.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved