This site provides a user interface to extract source code from .class and .jar ‘binary’ files. Until recently, you needed to use a Java decompiler and all of them were either unstable, obsolete, unfinished, or in the best case all of the above. The obsoleteness was typically proved by the fact that they can only decompile JDK 1.3 bytecode. But recently, a new wave of decompilers has forayed onto the market: Procyon, CFR, JD, Fernflower, Krakatau, Candle.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.
Andromeda makes reverse engineering of Android applications faster and easier.
Fernflower is an analytical decompiler for Java with command-line options and support for external classes.
A tool that generates Yara rules from training data using logistic regression and random forest classifiers.
UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.