Fernflower Logo

Fernflower

0
Free
Visit Website

Fernflower is the first actually working analytical decompiler for Java and probably for a high-level programming language in general. Naturally, it is still under development. Please send your bug reports and improvement suggestions to the issue tracker. Fernflower is licensed under the Apache Licence Version 2.0. Running from the command line: java -jar fernflower.jar [-<option>=<value>]* [<source>]+ <destination>. * means 0 or more times, + means 1 or more times. <source>: file or directory with files to be decompiled. Directories are recursively scanned. Allowed file extensions are class, zip, and jar. Sources prefixed with -e= mean 'library' files that won't be decompiled but taken into account when analyzing relationships between classes or methods. Especially renaming of identifiers (s. option 'ren') can benefit from information about external classes. <destination>: destination directory. <option>, <value>: a command-line option with the corresponding value (see 'Command-line options' below). Examples: java -jar fernflower.jar -hes=0 -hdc=0 c:\Temp\binary\ -e=c:\Java\rt.jar c:\Temp\source\ java -jar fernflower.jar -dgs=1 c:\Temp\binary\library.jar c:\Temp\bin

FEATURES

ALTERNATIVES

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

A curated list of open-source projects containing protestware sourced from various platforms.

Go bindings for YARA with installation and build instructions.

A Python-based tool for detecting XSS vulnerabilities

Scans running processes for potentially malicious implants and dumps them.

A tool for reverse engineering Android apk files.

Python 3 tool for parsing Yara rules with ongoing development.

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved