Category: java


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Bytecode EngineeringjavaJavaFXJavaFX ApplicationJVM BytecodeNEW TOOLSRecafReverse EngineeringStatic Analysis

Recaf – A Modern Java Bytecode Editor

Recaf is an open-source Java bytecode editor built on top of Objectweb's ASM. ASM is a bytecode manipulation library that abstracts away the constant pool and a few other class-file attributes. Since keeping track of the constant pool and managing proper stackframes are no longer necessary, complex changes can be made with relative ease. With additional features to assist in the process of editing classes, Recaf is the most feature rich free bytecode editor available.Useful InformationWhile ASM makes bytecode manipulation very simple it does…

Dexdex2jarjavaNEW TOOLSTrackers

Dex2Jar – Tools To Work With Android .Dex And Java .Class Files

dex2jar Tools to work with android .dex and java .class filesdex-reader/writer: Read/write the Dalvik Executable (.dex) file. It has a light weight API similar with ASM.d2j-dex2jar: Convert .dex file to .class files (zipped as jar)smali/baksmali: disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;"other tools: d2j-decrypt-stringUsagesh -f ~/path/to/apk_to_decompile.apkAnd the output file will be apk_to_decompile-dex2jar.jar.Need help ?send email to dex2jar@googlegroups.comor post on issue trackers list above.Download Dex2Jar

DrozerjavaNEW TOOLSRemote AccessSecurity AssessmentTesting Framework

Drozer v2.4.4 – The Leading Security Assessment Framework For Android

drozer (formerly Mercury) is the leading security testing framework for Android.drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.drozer provides tools to help you use, share and understand public Android exploits. It helps you to deploy a drozer Agent to a device through exploitation or social engineering. Using weasel (MWR's advanced exploitation payload) drozer is able to maximise the permissions…

Av EvasionjavaJava-StagerNetcatNEW TOOLSParameterPoCPython3

Java-Stager – A PoC Java Stager Which Can Download, Compile, And Execute A Java File In Memory

A PoC Java Stager which can download, compile, and execute a Java file in memory.This is for research purposes only, do not use this where you are unauthorised to do so.What is this?This is based on the work of James Williams from his talk "Next Gen AV vs My Shitty Code" available here:The key parts of the talk for me are:Load a Stager onto victim (touches disk, but is a benign binary)Stager downloads raw code over HTTP (which stays in memory)Stager compiles raw code…

Apk filesCommon VulnerabilitiesjavaNEW TOOLSReverse EngineerReverse EngineeringReverseAPK

ReverseAPK – Quickly Analyze And Reverse Engineer Android Packages

Quickly analyze and reverse engineer Android applications.FEATURES:Displays all extracted files for easy referenceAutomatically decompile APK files to Java and Smali formatAnalyze AndroidManifest.xml for common vulnerabilities and behaviorStatic source code analysis for common vulnerabilities and behaviorDevice infoIntentsCommand executionSQLite referencesLogging referencesContent providersBroadcast recieversService referencesFile referencesCrypto referencesHardcoded secretsURL'sNetwork connectionsSSL referencesWebView referencesINSTALL:./installUSAGE:reverse-apk <apk_name>Download ReverseAPK