A comprehensive collection of development utilities designed to help analyze and manage codebases, with special focus on Java/Minecraft mod development.
Comprehensive security analysis tool that scans codebases for common security vulnerabilities and potential threats.
Key Security Checks:
- 🚨 Critical Issues: Java deserialization (ObjectInputStream, XMLDecoder), Remote Code Execution vectors
- 💉 Injection Attacks: SQL injection, Command injection, LDAP injection, XXE vulnerabilities
- 🌐 Web Security: Cross-Site Scripting (XSS), insecure network communications
- 🔐 Cryptographic Issues: Weak hashing (MD5, SHA1), insecure ciphers, weak random generation
- 🔑 Credential Security: Hardcoded passwords, API keys, access tokens
- 📁 File Security: Path traversal vulnerabilities, insecure file operations
- 🪞 Reflection Abuse: Dangerous reflection usage patterns
Multi-Format Support:
- Source Code: Java, Python, JavaScript, PHP, C/C++, C#, SQL, XML, JSP, ASP
- Compiled Code: JAR files, .class files with bytecode analysis
- Real-time Analysis: Processes 900+ files efficiently with progress tracking
Usage Example:
🔍 Scanning for security vulnerabilities...
📂 Analyzing 903 files...
🛡️ SECURITY ANALYSIS COMPLETE
🚨 Total issues found: 25
📁 Vulnerable files: 3
⚡ SEVERITY BREAKDOWN:
🔴 CRITICAL: 2 issues (RCE risk)
🟠 HIGH: 12 issues (immediate attention)
🟡 MEDIUM: 11 issues (should fix)Advanced method call analysis tool that helps identify potentially problematic or excessive method usage in your codebase.
Key Features:
- Smart Pattern Detection: Automatically detects direct calls, instance calls, static calls, and chained calls
- Multi-language Support: Java, JavaScript/TypeScript, Python, C/C++, C#, Go, Rust, PHP, Ruby, Kotlin, Scala, Swift
- Comprehensive Analysis: Statistical analysis with detailed reports and issue categorization
- Configurable Thresholds: Customize what constitutes "excessive" usage for your project
Usage Example:
# Search for atan2 method calls
Method to search: atan2
Threshold: 10 calls
Results:
📊 Total calls found: 45 across 8 files
🚨 Issues detected: 1 high severity, 2 medium severity
📄 Detailed report saved with line-by-line analysisPowerful text search utility for finding specific patterns in codebases.
Specialized tool for Minecraft mod development that identifies duplicate mods in your mods folder.
Features:
- Detects mods with same modid but different versions
- Identifies suspicious mod files with problematic IDs
- Scans embedded mods within JAR files
- Generates detailed reports with recommendations
Analyzes JAR files to count and categorize Java classes.
- Clone the repository:
git clone https://github.com/quentin452/Cat-Pack-Utilities.git
cd Cat-Pack-Utilities- Install dependencies:
python !installdependencies.py- Run the main application:
python MainClass.pyLaunch the main application to access all utilities through a user-friendly graphical interface:
python MainClass.pyEach utility can also be run independently:
# Security Vulnerability Detector
python Catpackutilities/utilities/security_vulnerability_detector.py
# Excessive Calls Finder
python Catpackutilities/utilities/excessive_calls_finder.py
# Duplicate Mods Finder
python Catpackutilities/utilities/find_duplicate_mods.py
# Word/Name Searching
python Catpackutilities/utilities/word_or_name_searching.py- Security Vulnerability Detector: Comprehensive security scanning with 12+ vulnerability categories
- Excessive Calls Finder: See EXCESSIVE_CALLS_USAGE.md for comprehensive usage guide
- Duplicate Mods Finder: Includes built-in help and interactive guidance
- Other Utilities: Each tool includes interactive help and examples
The utilities generate various output files for analysis:
- Reports: Detailed analysis results saved in respective
*_reports/folders - Logs: Execution logs saved in
*_logs/folders for debugging and audit trails - Backups: Automatic backups of search results and configurations
- Python 3.7+
- tkinter (usually included with Python)
- PIL (Pillow) for image processing
- Additional dependencies installed via
!installdependencies.py
Contributions are welcome! Please feel free to submit issues, feature requests, or pull requests.
This project is licensed under the terms specified in LICENCE.txt.
- v0.3: Added Security Vulnerability Detector with 12+ security issue categories, multi-format support, and JAR/bytecode analysis
- v0.2: Added Excessive Calls Finder with advanced pattern detection and multi-language support
- v0.1: Initial release with duplicate mod finder and basic utilities