JEB Decompiler for ARM

JEB
ARM

Our ARM decompilers give reverse engineers and security auditors efficient ways to analyze malicious ARM programs and audit complex embedded systems.

Features

Our ARM 32-bit (aarch32/a32, thumb) and ARM 64-bit (aarch64/a64) decompilers provide the following features:

  • Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation to pseudo-C source code.
  • Advanced optimization passes to thwart protected code and clean-up obfuscation.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Type libraries for Linux, and Android-Linux, and Windows.
  • Full API to create custom plugins at the IR or AST levels, and perform automated code analysis in Python or Java.