Fernflower Logo

Fernflower

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

4,200
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Fernflower Description

Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general. Naturally, it is still under development. Please send your bug reports and improvement suggestions to the issue tracker. Fernflower is licensed under the Apache Licence Version 2.0. Running from the command line: java -jar fernflower.jar [-<option>=<value>]* [<source>]+ <destination>. * means 0 or more times, + means 1 or more times. <source>: file or directory with files to be decompiled. Directories are recursively scanned. Allowed file extensions are class, zip, and jar. Sources prefixed with -e= mean 'library' files that won't be decompiled but taken into account when analyzing relationships between classes or methods. Especially renaming of identifiers (s. option 'ren') can benefit from information about external classes. <destination>: destination directory. <option>, <value>: a command-line option with the corresponding value (see 'Command-line options' below). Examples: java -jar fernflower.jar -hes=0 -hdc=0 c:\Temp\binary\ -e=c:\Java\rt.jar c:\Temp\source\ java -jar fernflower.jar -dgs=1 c:\Temp\binary\library.jar c:\Temp\bin

Fernflower FAQ

Common questions about Fernflower including features, pricing, alternatives, and user reviews.

Fernflower is Fernflower is an analytical decompiler for Java with command-line options and support for external classes.. It is a Security Operations solution designed to help security teams with Binary Analysis.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Attify Offensive IoT Exploitation Logo

Private training course for IoT device pentesting and exploitation

0
Nightwing DejaVM Logo

Whole-system emulation environment for software dev, debugging, testing & security

0
Zenyard RE Agent Logo

AI agent for in-depth binary analysis and reverse engineering assistance.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
Shellcode2PE Logo

A Python script that converts shellcode into a PE32 or PE32+ file.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox