This site provides a user interface to extract source code from .class and .jar ‘binary’ files. Until recently, you needed to use a Java decompiler and all of them were either unstable, obsolete, unfinished, or in the best case all of the above. The obsoleteness was typically proved by the fact that they can only decompile JDK 1.3 bytecode. But recently, a new wave of decompilers has forayed onto the market: Procyon, CFR, JD, Fernflower, Krakatau, Candle.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
A collaborative malware analysis framework with various features for automated analysis tasks.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.