Loading...

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Boomerang Decompiler is an open source machine code decompiler that converts compiled binary executables back into high-level C source code. The tool supports multiple processor architectures including x86 (IA-32), PowerPC (PPC), and ST20. It can process various executable file formats such as ELF, PE, DOS MZ, DOS/4GW LE, and Mach-O. The decompiler analyzes binary machine code and reconstructs the original program logic, control flow, and data structures to generate readable C code output. This reverse engineering capability assists security researchers and analysts in understanding the functionality of compiled programs without access to original source code. Boomerang requires a 64-bit operating system and depends on several development tools including a C++17 compiler, CMake, Qt5, Capstone disassembly framework, GNU bison, and GNU flex. The project is distributed under a BSD license and provides both pre-compiled packages and source code for building from the development branch. The tool includes optional components for documentation generation, regression testing, and build optimization through CCache integration.
Common questions about Boomerang Decompiler including features, pricing, alternatives, and user reviews.
Boomerang Decompiler is An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.. It is a Security Operations solution designed to help security teams with Reverse Engineering, Binary Analysis, Open Source.
Get strategic cybersecurity insights in your inbox
JD-GUI is a graphical Java decompiler that reconstructs and displays source code from compiled ".class" files for reverse engineering and code analysis purposes.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
PinCTF is a Python wrapper tool that uses Intel's Pin framework to instrument binaries and count instructions for reverse engineering analysis.