Graphical tool for reverse engineering of Angular projects. Ngrev allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and directives. The tool performs static code analysis which means that you don’t have to run your application in order to use it.
How To Use?
macOS
*.dmg
file.Linux
*.AppImage
file.*.AppImage
file (you may need to chmod +x *.AppImage
).Windows
*.exe
file.Also Read – RetDec : RetDec Is A Retargetable Machine-Code Decompiler Based On LLVM
Creating A Custom Theme
You can add your own theme by creating a [theme-name].theme.json
file in Electron [userData]/themes
. For a sample theme see Dark.
Application Requirements
Your application needs to be compatible with the Angular’s AoT compiler (i.e. you should be able to compile it with ngc
).
Using with Angular CLI
ngrev
.Select Project
and select [YOUR_CLI_APP]/src/tsconfig.app.json
.Using with Angular Seed
ngrev
.Select Project
and select [YOUR_CLI_APP]/src/client/tsconfig.json
.Demo
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…