JEB is PNF Software reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.
Android Decompiler + Android Debuggers
Use JEB to perform reverse engineering of malicious APKs and security audits.
- Decompile code using our Dalvik decompiler, including multi-dex APK.
- Refactor the analysis to defeat obfuscated code generated by application protectors.
- Reconstruct resources and obfuscated XML files
- Debug Dalvik code as well as all native code (Intel, ARM), seamlessly
- Automate and script your reverse engineering tasks via our API.
ARM Decompiler
Use JEB to reverse engineer programs and malware written for ARM platforms.
- Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
- Decompilation of ARM 32-bit and ARM-Thumb code to pseudo-C source code.
- Advanced optimization passes to thwart protected or obfuscated code.
- Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
- Full API to perform advanced and/or automated code analysis in Python or Java.
MIPS Decompiler
Use JEB to reverse engineer MIPS embedded programs and malware.
- Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
- Decompilation of MIPS 32-bit to pseudo-C source code.
- Advanced optimization passes to thwart protected or obfuscated code.
- Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
- Full API to perform advanced and/or automated code analysis in Python or Java.
Intel Decompiler
Use JEB to reverse engineer x86 32-bit and x86 64-bit programs and malware.
- Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
- Decompilation of x86 and x86-64 to pseudo-C source code.
- Partial Class Recovery and Decompilation to C++ or programs compiled with MS VCPP
- Advanced optimization passes to thwart protected or obfuscated code.
- Win32 type librariesand common signatures for efficient Windows file analysis.
- Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
- Full API and access to the Intermediate Representations to perform advanced and/or automated code analysis in Python or Java.
PDF Document Analyzer Analyze malicious Adobe™ PDF files using the PDF document analyzer in the industry
- Break-down the PDF structure into a visually compelling and navigable tree.
- Deal with corrupt files, complex streams (eg, multiple encodings, etc.).
- Retrieve 20+ notifications and alerts generated by the analyzer to pin-point suspicious areas and use them to issue a determination on the file.
- Extract embedded Javascript even in the most extreme cases.
- Automate the reverse engineering process via the JEB API to perform bulk analysis.
Spacer