Krakatau provides an assembler and disassembler for Java bytecode, allowing conversion of binary classfiles to human-readable text format, creation of classfiles from scratch by writing bytecode manually, examination and comparison of low-level details of Java binaries, and decompilation of Java binaries to readable source code. It can handle highly obfuscated code and supports some undocumented features found in old versions of the JVM. However, it does not support some Java 8+ features such as lambdas.
FEATURES
SIMILAR TOOLS
Generates a YARA rule to match basic blocks of the current function in IDA Pro
A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A Burp plugin for identifying potential vulnerabilities in web applications
A standalone binary inspection tool for Android developers with support for various formats and dependencies.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.