Reverse Engineering
for Professionals.

Decompile and debug binary code.
Break down and analyze document files.

Dalvik, MIPS, ARM & x86 Decompilers.

JEB 2.3.14 (2018/06/01) / JEB3 Beta Demos Latest blog: May 28: JEB3 Beta is Available

JEB Decompiler

Reverse engineering is a complex and lengthy task. Use the right software for the job and cut down on expensive man-hours.

JEB is a modular reverse engineering platform for professionals. Its extensible nature allows reverse engineers to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.

The Android modules for JEB provide static and dynamic analysis capabilities to analyze Android applications, goodware or badware, small or large.

The native code analysis modules provide advanced code analyzers and decompilers for MIPS, ARM, Intel x86 processors.

Our PDF module for JEB is the most complete PDF document analyzer in the industry. Use it to manually or automatically reverse engineer documents.

A sample of our customers

Our customers love JEB

"JEB has proved invaluable, both as the principal manual reverse-engineering tool for Android apps as well as within our automation back-ends." – Engineer at a US Defense Contractor

"JEB rescued me many times reversing APKs where free decompilers failed. It is simply the best and even runs on my Mac." – Researcher at Forcepoint (ex-Websense)

"Been wondering what we use to decode APKs for teardowns? Secret sauce is JEB." – Reverse Engineer at Android Police

"Decrypting encrypted classes using JEB and a custom plugin. Sure saves a lot of time!" – Security Researcher Justin Case

Learn more about JEB