Fernflower Logo

Fernflower

0
Free
Visit Website

Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general. Naturally, it is still under development. Please send your bug reports and improvement suggestions to the issue tracker. Fernflower is licensed under the Apache Licence Version 2.0. Running from the command line: java -jar fernflower.jar [-<option>=<value>]* [<source>]+ <destination>. * means 0 or more times, + means 1 or more times. <source>: file or directory with files to be decompiled. Directories are recursively scanned. Allowed file extensions are class, zip, and jar. Sources prefixed with -e= mean 'library' files that won't be decompiled but taken into account when analyzing relationships between classes or methods. Especially renaming of identifiers (s. option 'ren') can benefit from information about external classes. <destination>: destination directory. <option>, <value>: a command-line option with the corresponding value (see 'Command-line options' below). Examples: java -jar fernflower.jar -hes=0 -hdc=0 c:\Temp\binary\ -e=c:\Java\rt.jar c:\Temp\source\ java -jar fernflower.jar -dgs=1 c:\Temp\binary\library.jar c:\Temp\bin

FEATURES

ALTERNATIVES

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

A tool for searching a Git repository for interesting content

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

Interactive malware hunting service with live access to the heart of an incident.

A Python script for scanning data within an IDB using Yara