Ajar - Auto backdoors .jar files with a specified .java file.

Ajar – Auto backdoors .jar files with a specified .java file.

Injects backdoor.java into target.jar. May prove useful in MitM attacks. This happens by:

+ Unzipping target.jar to ./tmp/
+ Parsing manifest for Main-Class value
+ Changing Main-Class to the backdoor
+ Modifying the backdoor to call the main() method of the original initial .class at the end of it’s own main() method
+ Compiling the modified backdoor.java to ./tmp/backdoor.class
+ Rezipping ./tmp/* to outfile.jar (default is backdoor.jar)
If the backdoor is a persistent function (such as a shell listening on a socket), make sure to spin it off into it’s own thread or the main app will never execute. Tool assumes javac is in your path and you can read/write/create to a tmp dir in the running location. Some .jar files don’t seem to play nicely when unzipping. Notable example of this is the free version of Burp1.6 (although the pro version worked fine).
Sample Usage:

Example Usage : njects backdoor.java into target.jar. May prove useful in MitM attacks.

Example Usage : njects backdoor.java into target.jar. May prove useful in MitM attacks.

Download : Ajar-Master.zip  | Clone Url 
Source: https://github.com/Atticuss