Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb’s ASM. No more hassling with the constant pool or stack-frames required. 

Also Read : IP Obfuscator – Simple Tool to Social Engineer and Bypass Firewall

Requirements

You can run Recaf with Java 8 or higher (Its recommended that you use the lastest jdk8 release from jdk.java.net). Using Java 9 and higher requires an additional step to use.

  • Java 8: No additional steps required.
  • Java 9+: Update the controlsfx dependency in the pom.xml such that the 8.40.14 release is changed to the 9.0.0 release. You can then build from the source code with maven (Open a terminal and enter mvn package assuming you have Maven installed). Be aware that the github releases are based on Java 8.

Running & Updates

To get the latest version of Recaf you can either download the source code and compile with maven or grab a binary from the releases page.

As a jar file you can double click it to run Recaf. However it is reccomended that you launch via command line so you can specify the JDK java executable.

Doing this will unlock additional features that rely on JDK functionality (tools.jar). For example on windows you would use the following command:

“C:\Program Files\Java\jdk1.8.0_202\bin\java.exe” -jar recaf.jar

  • Note: To ensure the classpath contains the contents of jdk\lib\tools.jar copy it into your jdk\jre\lib\ext folder.
  • Note: You can automate opening files via command line: java -jar recaf.jar -i MyJar.jar -c com/example/MyClass
R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

7 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

8 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 day ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 day ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 day ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

3 days ago