JEB 2.0.6.201508252211
JEB 2.0.6.201508252211 | 146 Mb
Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.
Decompile code using our Dalvik decompiler, including multi-dex APK.
Refactor the analysis to defeat obfuscated code generated by application protectors.
Reconstruct resources and obfuscated XML files.
Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
Automate and script your reverse engineering tasks via our API.
Powerful
Perform precise and robust decompilation of Android apps and Dalvik bytecode.
Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).
Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.
Flexible
Refactor, annotate, navigate, and modify the analysis output.
Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).
Extensible
Leverage the JEB API to automate reverse engineering tasks.
Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.
JEB provides bytecode and native (ARM, Intel) debugger modules to allow dynamic analysis of complex apps.
Seamlessly debug Dalvik bytecode and native machine code, for all apps: From Dalvik, step inside JNI methods (native routines) and continue debugging native code. Conversely, after a native method has completed, JEB will resume the Dalvik debugging session.
JEB allows debugging of all apps, including those that do not explicitly allow debugging (ARM v7 platform only).
Use the JEB Debuggers API to automate tasks such as memory examination or routine hooking for data interception.
Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.
Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.
Break-down the PDF structure into a visually compelling and navigable tree.
Deal with corrupt files, complex streams (eg, multiple encodings, etc.).
Retrieve 20+ notifications and alerts generated by the analyzer to pin-point suspicious areas and use them to issue a determination on the file.
Extract embedded jаvascript even in the most extreme cases.
Automate the reverse engineering process via the JEB API to perform bulk analysis.
[/b]
[b] Only for V.I.P
Warning! You are not allowed to view this text.