JEB is our reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.

Android Decompiler + Android Debuggers

Use JEB to perform reverse engineering of malicious APKs and security audits.

Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.

Perform static and dynamic analysis of Android applications, goodware or badware, small or large.

  • Decompile code using our Dalvik decompiler, including multi-dex APK.
  • Refactor the analysis to defeat obfuscated code generated by application protectors.
  • Reconstruct resources and obfuscated XML files.
  • Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
  • Automate and script your reverse engineering tasks via our API.


Perform precise and robust decompilation of Android apps and Dalvik bytecode.

Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).

Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.


Refactor, annotate, navigate, and modify the analysis output.

Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).


Leverage the JEB API to automate reverse engineering tasks.

Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.

Embedded Code: MIPS Decompiler

Use JEB to reverse engineer MIPS programs and malware.

Our MIPS processor and microcontroller machine code decompiler allows reverse engineers and security auditors to analyze malicious MIPS programs and audit complex embedded systems (routers, set-top boxes, IOT devices, etc.).

Our MIPS 32-bit decompiler provides the following unmatched features:

  • Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API to perform advanced and/or automated code analysis in Python or Java.

PDF Document Analyzer

Analyze malicious Adobe™ PDF files using the best PDF document analyzer in the industry.

Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.

Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.

  • Break-down the PDF structure into a visually compelling and navigable tree.
  • Deal with corrupt files, complex streams (eg, multiple encodings, etc.).
  • Retrieve 20+ notifications and alerts generated by the analyzer to pin-point suspicious areas and use them to issue a determination on the file.
  • Extract embedded Javascript even in the most extreme cases.
  • Automate the reverse engineering process via the JEB API to perform bulk analysis.

Analyze Anything

Leverage the JEB API to write custom modules to handle virtually any file type.

We do provide training for power‑users that wish to use the API to its full extent.
Our community of users also share free open‑source modules, plugins, scripts and tutorials for developers.

Features Matrix

A detailed chart of which analysis modules are bundled with our various license types.

Modules v       Subscription Type >
Base Plugins
Archive files (zip, 7z, tar)
Image files (bmp, png, jpg, gif, ico)
Structured text files (html, xml, json)
Certificate files (x.509)
Application Processors
Android APK (incl. dex, odex, x-apk)
Windows PE/PE64/COFF
Linux ELF/ELF64
Mach-O, Mach-O/FAT
Intel HEX (ihex)
Chrome Extension (crx)
Dalvik Disassembler
Intel x86 Disassembler
Intel x86-64 (AMD64) Disassembler
ARM (32, Thumb) Disassembler
ARM64 (Aarch64) Disassembler
MIPS Disassembler
Atmel AVR Disassembler
Dalvik Debugger (Android)
Intel x86 Debugger (GDB/LLDB all platforms, incl. Android)
Intel x86-64 Debugger (GDB/LLDB all platforms, incl. Android)
ARM Debugger (GDB/LLDB all platforms, incl. Android)
ARM64 Debugger (GDB/LLDB all platforms, incl. Android)
MIPS Debugger (GDB/LLDB all platforms, incl. Android)
Dalvik Decompiler
ARM Decompiler (beta)
MIPS Decompiler
Document Parsers
Adobe PDF
FAT file systems (file access table) (plugin)
Purchase a JEB License