Boomerang Decompiler Logo

Boomerang Decompiler

0
Free
Visit Website

This is a fork of Boomerang, a general, open source (BSD licensed) machine code decompiler. Boomerang currently supports: architectures: x86 (IA-32 only), PPC, ST20 file formats: ELF, PE, DOS MZ, DOS/4GW LE, Mach-O high-level language output: C. Although there are pre-compiled packages available for release versions (master branch), it is currently recommended to build the development version (develop branch) of the decompiler from source. Building: Build status Test Coverage develop master Building prerequisites: - A 64 bit operating system (32 bit might or might not work, but it is not supported.) - A C++17 compiler (GCC 7+, Clang 6+, MSVC 2017+ are known to work) - CMake 3.13+ - Qt5 (Qt 5.12+ is known to work, earlier versions should also work) - Capstone 4.0.1+ - GNU bison 3.3+ - GNU flex 2.6+ - CCache 3.2+ (optional, for recompilation speed) - Doxygen 1.8+ (optional, for documentation) - Python 3 (optional, for regression tests) Building on Linux: On a Linux system you can build and install Boomerang with the usual cmake-make-make-install procedure. On a Debian-compatible system (e.g. Ubuntu) these commands will clone, build and install Boomerang: sudo apt-get install git build-e

FEATURES

ALTERNATIVES

Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

Collection of Python scripts for automating tasks and enhancing IDA Pro functionality

A tool for injecting and loading executables with a focus on stealth techniques.

A Yara ruleset for detecting PHP shells and other webserver malware.

Automatic analysis of malware behavior using machine learning.

Scan folders and files for crypto patterns, hacking team malware, and malicious documents using PEID signatures.