Your location:Home>编译器 安装程序制作>反编译

JEB Decompiler

JEB Decompiler

 

JEB is our reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.

 

Android Decompiler + Android Debuggers

Use JEB to perform reverse engineering of malicious APKs and security audits.

 

Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.

 

Perform static and dynamic analysis of Android applications, goodware or badware, small or large.

 

Powerful

Perform precise and robust decompilation of Android apps and Dalvik bytecode.

Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB.

Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.

 

Flexible

Refactor, annotate, navigate, and modify the analysis output.

Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).

 

Extensible

Leverage the JEB API to automate reverse engineering tasks.

Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.

 

Use JEB to debug closed-source Android applications

 

JEB provides bytecode and native (ARM, Intel) debugger modules to allow dynamic analysis of complex apps.

 

ARM Decompiler

Use JEB to reverse engineer programs and malware written for ARM platforms.

 

Our ARM machine code decompiler allows reverse engineers and security auditors to analyze malicious ARM binary files.

 

The ARM decompiler provides the following features:

 

MIPS Decompiler

Use JEB to reverse engineer MIPS embedded programs and malware.

 

Our MIPS processor and microcontroller machine code decompiler allows reverse engineers and security auditors to analyze malicious MIPS programs and audit complex embedded systems (routers, set-top boxes, IOT devices, etc.).
 

The MIPS decompiler provides the following unmatched features:

 

Intel Decompiler

Use JEB to reverse engineer x86 32-bit and x86 64-bit programs and malware.

 

Our Intel x86 and Intel x86-64 decompilers are part of JEB 3 Pro and Pro Floating.

 

The x86 decompiler and x86-64 decompiler provide the following features:

 

WebAssembly Decompiler

Use JEB to reverse engineer WebAssembly binary modules.
 

The WebAssembly plugins provide the following features:

 

JEB WebAssembly plugins can also be used to decompile Smart Contracts compiled to wasm, such as EOS or Parity contracts.

 

Ethereum Decompiler

Use JEB to reverse engineer Ethereum opaque smart contracts and dApps to Solidity-like high-level code.

 

Cut down on costly reverse engineering time: decompile Ethereum smart contracts to Solidity-like source code to easily understand and review closed-source contracts and dApps. 
 


The picture below shows JEB dual-pane "EVM assembly/decompiled code" view of a contract live on Ethereum's mainnet. (Click to enlarge.)

 

PDF Document Analyzer

Analyze malicious Adobe™ PDF files using the best PDF document analyzer in the industry.

 

Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.

 

Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.

 

Analyze Anything

Leverage the JEB API to write custom modules to handle virtually any file type.

 

We do provide training for power?users that wish to use the API to its full extent.
Our community of users also share free open?source modules, plugins, scripts and tutorials for developers.

 

Features Matrix

 

This table presents which analysis modules and core features ship with our various license types.

 

License Type

JEB x86
Home Edition

JEB Android

JEB Pro

Decompilers

 

Dalvik Decompiler

 

V

V

ARM Decompiler

 

V

V

ARM64 Decompiler

 

V

V

MIPS Decompiler

 

 

V

Intel x86 Decompiler

V

 

V

Intel x86-64 Decompiler

V

 

V

WebAssembly Decompiler

 

 

V

Ethereum Decompiler for Smart Contracts (EVM Decompiler)

 

 

V

Base Plugins

 

Archive files (zip, 7z, tar)

V

V

V

Image files (bmp, png, jpg, gif, ico)

V

V

V

Structured text files (html, xml, json)

V

V

V

Certificate files (x.509)

V

V

V

Application Processors

 

Android APK (incl. dex, odex, x-apk)

 

V

V

Windows PE/PE64/COFF, PDB

V

V

V

Linux ELF/ELF64

V

V

V

Mach-O, Mach-O/FAT

V

V

V

Intel HEX (ihex)

V

V

V

Chrome Extension (crx)

V

V

V

WebAssembly module (wasm)

 

V

V

Ethereum contracts (evm)

 

V

V

Disassemblers

 

Dalvik Disassembler

 

V

V

Intel x86 Disassembler

V

V

V

Intel x86-64 (AMD64) Disassembler

V

V

V

ARM (32, Thumb) Disassembler

 

V

V

ARM64 (Aarch64) Disassembler

 

V

V

MIPS Disassembler

 

V

V

Atmel AVR Disassembler

 

V

V

Debuggers

 

Dalvik Debugger (Android)

 

V

V

Intel x86 Debugger (GDB/LLDB all platforms, incl. Android)

V

V

V

Intel x86-64 Debugger (GDB/LLDB all platforms, incl. Android)

V

V

V

ARM Debugger (GDB/LLDB all platforms, incl. Android)

 

V

V

ARM64 Debugger (GDB/LLDB all platforms, incl. Android)

 

V

V

MIPS Debugger (GDB/LLDB all platforms, incl. Android)

 

V

V

Document Parsers

 

Adobe PDF

 

 

V

FAT file systems (file access table)

 

V

V

Platform

 

Persist JEB Projects to JDB2 Databases

V

V

V

Interactivity (refactoring, renaming, commenting, etc.)

V

V

V

Graphing (CFG, Callgraphs, etc.)

V

V

V

Support for multiple Artifacts in a same Project

 

V

V

Extensions - Client scripts in Python

V

V

V

Extensions - Back-end plugins in Java

 

V

V

 

北京哲想软件有限公司