Use JEB to break-down, decompile and debug Android applications. Reverse engineer malicious Android APKs and perform security audits.
Android Decompiler + Android Debuggers
Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes.
Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.
Perform static and dynamic analysis of Android applications, goodware or badware, small or large.
Decompile code using our Dalvik decompiler, including multi-dex APK.
Refactor the analysis to defeat obfuscated code generated by application protectors.
Reconstruct resources and obfuscated XML files.
Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
Automate and script your reverse engineering tasks via our API.
One of the most innovative features introduced in JEB 2.2 is the ability to debug closed-source apps
JEB provides bytecode and native (ARM, Intel) debugger modules to allow dynamic analysis of complex apps.
Seamlessly debug Dalvik bytecode and native machine code, for all apps:
From Dalvik, step inside JNI methods (native routines) and continue debugging native code.
Conversely, after a native method has completed, JEB will resume the Dalvik debugging session.
JEB allows debugging of all apps, including those that do not explicitly allow debugging (ARM v7 platform only).