Reverse Engineering for Professionals.

Decompile and debug binary code. Break down and analyze document files.

Dalvik, MIPS, ARM, Intel & WebAssembly Decompilers.

JEB 2.3.14 (2018/06/01) / JEB3 Beta Demos Latest blogs: July 9: Reverse Engineering WebAssembly
May 28: JEB3 Beta is Available

JEB Decompiler

Reverse engineering is a complex and lengthy task. Use the right software for the job and cut down on expensive man-hours.

JEB is a modular reverse engineering platform for professionals.

Perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline. Use JEB to analyze Android apps, reverse engineer Windows malware, audit embedded code, and much more.

The Android modules for JEB provide static and dynamic analysis capabilities to analyze Android applications, goodware or badware, small or large.

The native code analysis modules provide advanced code analyzers and decompilers for MIPS, ARM and ARM64, Intel x86 and x64 processors, as well as WebAssembly modules.

Our PDF module for JEB is the most complete PDF document analyzer in the industry. Use it to manually or automatically reverse engineer documents.

A sample of our customers

Our customers love JEB

"JEB has proved invaluable, both as the principal manual reverse-engineering tool for Android apps as well as within our automation back-ends." – Engineer at a US Defense Contractor

"JEB rescued me many times reversing APKs where free decompilers failed. It is simply the best and even runs on my Mac." – Researcher at Forcepoint (ex-Websense)

"Been wondering what we use to decode APKs for teardowns? Secret sauce is JEB." – Reverse Engineer at Android Police

"Decrypting encrypted classes using JEB and a custom plugin. Sure saves a lot of time!" – Security Researcher Justin Case

Learn more about JEB