There are 9 repositories under bytecode-manipulation topic.
Multifunctional java deobfuscation tool suite
Companion library to SpongePowered Mixin with many custom injectors for a more expressive experience.
All-in-one Java reverse engineering tool
Gradle plugin for Sentry Android. Upload proguard, debug files, and more.
Standalone program and library which can downgrade Java classes/programs down to Java 8
Minecraft Server (Bukkit, Spigot, Paper) backdoor, using ow2 asm
Class Annotation Processor Tool on Android
A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment
Example of using the android TranformAPI for bytecode manipulation
An extensible java agent framework that instruments (modifies the bytecode at class loading time) programs running on the JVM, with the purpose of capturing method invocation events (start, finish, errors ...) and notifying custom listeners.
Java class file inspection library for .NET.
Minecraft plugin backdoor injector
常见框架开发技术的demo汇总,包括java字节码编程(java agent, instrument, byte buddy), java动态代理,自定义classloader,java spi, zero copy, netty, spring aop/condition,spring boot starter, 数据库连接池等。
Maven plugin that will apply Javassist bytecode transformations during build time.
CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL
A java agent with the main purpose of preventing other agents
KibbleLands Spigot patcher
An all-purpose mixins framework for Java bytecode manipulation at runtime, targeted at those with minimal understanding of the bytecode structure.
Sample code for performing bytecode manipulation in an Android app using the Android Transform API.
An extremely small and fast Bukkit tool to dynamically replace version-specific types (nms, craftbukkit) at runtime without any boilerplate.
Applies Mixin-style monkey patches to .java source or compiled .class files. Lightweight
A JVM Bytecode Manipulation Framework inspired by ASM.
JDBL automatically removes unnecessary bytecode from Java applications through dynamic analysis https://dl.acm.org/doi/abs/10.1145/3546948