Fernflower Logo

Fernflower

0
Free
Visit Website

Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general. Naturally, it is still under development. Please send your bug reports and improvement suggestions to the issue tracker. Fernflower is licensed under the Apache Licence Version 2.0. Running from the command line: java -jar fernflower.jar [-<option>=<value>]* [<source>]+ <destination>. * means 0 or more times, + means 1 or more times. <source>: file or directory with files to be decompiled. Directories are recursively scanned. Allowed file extensions are class, zip, and jar. Sources prefixed with -e= mean 'library' files that won't be decompiled but taken into account when analyzing relationships between classes or methods. Especially renaming of identifiers (s. option 'ren') can benefit from information about external classes. <destination>: destination directory. <option>, <value>: a command-line option with the corresponding value (see 'Command-line options' below). Examples: java -jar fernflower.jar -hes=0 -hdc=0 c:\Temp\binary\ -e=c:\Java\rt.jar c:\Temp\source\ java -jar fernflower.jar -dgs=1 c:\Temp\binary\library.jar c:\Temp\bin

FEATURES

ALTERNATIVES

A program to extract IOCs from text files using regular expressions

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

A tool that generates pseudo-malicious files to trigger YARA rules.

Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.

A collaborative malware analysis framework with various features for automated analysis tasks.

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

A tool for finding and exploiting SQL injection vulnerabilities in web applications

Debugger and .NET assembly editor with advanced debugging features.