Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general. Naturally, it is still under development. Please send your bug reports and improvement suggestions to the issue tracker. Fernflower is licensed under the Apache Licence Version 2.0. Running from the command line: java -jar fernflower.jar [-<option>=<value>]* [<source>]+ <destination>. * means 0 or more times, + means 1 or more times. <source>: file or directory with files to be decompiled. Directories are recursively scanned. Allowed file extensions are class, zip, and jar. Sources prefixed with -e= mean 'library' files that won't be decompiled but taken into account when analyzing relationships between classes or methods. Especially renaming of identifiers (s. option 'ren') can benefit from information about external classes. <destination>: destination directory. <option>, <value>: a command-line option with the corresponding value (see 'Command-line options' below). Examples: java -jar fernflower.jar -hes=0 -hdc=0 c:\Temp\binary\ -e=c:\Java\rt.jar c:\Temp\source\ java -jar fernflower.jar -dgs=1 c:\Temp\binary\library.jar c:\Temp\bin
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
A program to manage yara ruleset in a database with support for different databases and configuration options.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A tool designed to handle archive file data and augment Yara's capabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.