Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.
Perform static and dynamic analysis of Android applications, goodware or badware, small or large.
Perform precise and robust decompilation of Android apps and Dalvik bytecode.
Our in-house decompiler includes optimizers able to auto-decrypt contents, unreflect API calls, and clean-up many types of obfuscated code.
Our Dalvik and native code debuggers offer features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.
Refactor, annotate, navigate, and modify the analysis output.
Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).
Leverage the JEB API to automate reverse engineering tasks.
Using Java or Python, users can write scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends. Decompiler extensions accept user-provided IR optimizers to further clean up obfuscated code.
The x86 decompiler and x86-64 decompiler provide the following features:
The ARM decompiler provides the following features:
The MIPS decompiler provides the following features:
Features specific to the RISC-V plugins:
The WebAssembly plugins provide the following features:
JEB WebAssembly plugins can also be used to decompile Smart Contracts compiled to wasm, such as EOS or Parity contracts.
Cut down on costly reverse engineering time: decompile Ethereum smart contracts to
Solidity-like source code to easily understand and review closed-source contracts and dApps.
Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.
Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.
|Build Type >||
(or Pro Floating)
|Suitable for enterprise or professional use|
|Dalvik Decompiler (a.k.a. Android Decompiler)|
|Deobfuscation module for "virtualized" code (details)|
|Advanced deobfuscators requiring native code emulation (JNI) (details, details)|
|Intel x86 Decompiler|
|Intel x86-64 Decompiler|
|S7 PLC Block Decompiler|
|Ethereum Decompiler for Smart Contracts (EVM Decompiler)|
|Diem (Libra) Decompiler for Move modules (open-sourced)|
|Archive files (zip, 7z, tar)|
|Image files (bmp, png, jpg, gif, ico)|
|Structured text files (html, xml, json)|
|Certificate files (x.509)|
|Android APK (incl. dex, odex, x-apk)|
|Windows PE/PE64/COFF, PDB|
|Intel HEX (ihex)|
|Chrome Extension (crx)|
|WebAssembly module (wasm)|
|Ethereum contracts (evm)|
|Intel x86 Disassembler|
|Intel x86-64 (AMD64) Disassembler|
|ARM (32, Thumb) Disassembler|
|ARM64 (Aarch64) Disassembler|
|Atmel AVR 8-bit Disassembler|
|Miscellaneous Binary Parser Plugins|
|Flutter/Dart AOT Snapshot Parser (limitations)|
|Dalvik Debugger (Android)|
|Intel x86 Debugger (GDB/LLDB all platforms, incl. Android)|
|Intel x86-64 Debugger (GDB/LLDB all platforms, incl. Android)|
|ARM Debugger (GDB/LLDB all platforms, incl. Android)|
|ARM64 Debugger (GDB/LLDB all platforms, incl. Android)|
|MIPS Debugger (GDB/LLDB all platforms, incl. Android)|
|FAT file systems (file access table)||(plugin)|
|Persist JEB Projects to JDB2 Databases|
|Interactivity (refactoring, renaming, commenting, etc.)|
|Graphing (CFG, Callgraphs, etc.)|
|Support for multiple Artifacts in a same Project|
|Extensions - Client scripts in Python|
|Extensions - Back-end plugins in Java|
|Automation / headless launcher|