Reverse engineering a Java program
Common Information
Type Value
UUID 7655c43f-c066-4d02-bc41-541ee1445df4
Fingerprint 6a78481c7c510688
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 17, 2024, 8:17 p.m.
Added to db Sept. 17, 2024, 10:53 p.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline Reverse engineering a Java program
Title Reverse engineering a Java program
Detected Hints/Tags/Attributes 30/1/13
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 171 Malware on Medium https://medium.com/feed/tag/malware 2024-08-30 22:08
Details 172 Reverse Engineering on Medium https://medium.com/feed/tag/reverse-engineering 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 28
docs.oracle.com
Details Domain 4127
github.com
Details Domain 6
main.java
Details Domain 88
main.py
Details File 1
jvms-4.html
Details File 6
main.java
Details File 76
main.py
Details File 1
jvms-6.html
Details Github username 1
rax-x
Details Url 1
https://docs.oracle.com/javase/specs/jvms/se8/html/jvms-4.html#jvms-4.1
Details Url 1
https://docs.oracle.com/javase/specs/jvms/se13/html/jvms-4.html#jvms-4.7
Details Url 1
https://github.com/rax-x/java-class-reader.
Details Url 1
https://docs.oracle.com/javase/specs/jvms/se8/html/jvms-6.html