• 首頁 Home
  • 關於友環 About Linksoft
  • 活動資訊 Events
  • 聯絡我們 Contact Us
  • 註冊
  • 登入
+886-2-2221-2155
[email protected]t.com.tw
0
已加入詢價收藏車: 0筆
  • 產品分類列表
    • 商務工具
    • 應用軟體
    • 開發及程式工具
    • 系統工具
    • 傳輸.遠控.郵件
    • 資訊安全工具
    • 文書處理
    • PDF 應用
    • 網頁相關
    • 圖表編輯
    • 簡報排版
    • 影音軟體
    • 統計分析軟體
    • 數值分析軟體
    • 學術研究軟體
    • 開發及程式工具
      • 商務工具 應用軟體 系統工具 傳輸.遠控.郵件 資訊安全工具 文書處理 PDF 應用 網頁相關 圖表編輯 簡報排版 影音軟體 統計分析軟體 數值分析軟體 學術研究軟體
    • 程式碼編輯
      • 資料庫開發管理 Java & XML 程式碼檢查 虛擬裝置 終端機與伺服器 軟體封裝 開發追蹤檢測 ASP 工具 PHP 工具 C++ 工具 日誌分析 電路板設計 開發整合工具 驅動程式開發 OPC 工具 圖表開發程式
    • JEB 反編譯工具
JEB 反編譯工具

本公司皆販售最新版本,目前版本僅供參考
最新版 JEB v3.27 更新於 2020/11/24

加入詢價收藏車

直接詢價

  • 產品介紹
  • 特色
  • 系統需求
  • 版本比較

逆向工程是一件複雜而漫長的工作,選用對的工具為您完成,節省寶貴的時間。

JEB 是一套為專業工程師設計的模組化逆向工程平台。它的功能豐富,讓工程師執行disassembly,decompilation,debugging,以及分析程式碼或文件檔案。您可對程式手動執行工作,或是將它排程入軟體分析自動執行。

  • The Android modules for JEB provide static and dynamic analysis capabilities to analyze Android applications, goodware or badware, small or large.
  • The native code analysis modules provide advanced code analyzers and decompilers for MIPS, ARM and ARM64, Intel x86 and x64 processors, as well as WebAssembly modules and Ethereum smart contracts
  • Our PDF module for JEB is the most complete PDF document analyzer in the industry. Use it to manually or automatically reverse engineer documents.

 

 

Android Decompiler + Android Debuggers
Use JEB to perform reverse engineering of malicious APKs and security audits.
Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.

Perform static and dynamic analysis of Android applications, goodware or badware, small or large.

  • Decompile code using our Dalvik decompiler, including multi-dex APK.
  • Refactor the analysis to defeat obfuscated code generated by application protectors.
  • Reconstruct resources and obfuscated XML files.
  • Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
  • Automate and script your reverse engineering tasks via our API.

 

Powerful
Perform precise and robust decompilation of Android apps and Dalvik bytecode.
Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).
Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.

 

Flexible
Refactor, annotate, navigate, and modify the analysis output.Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).

 

Extensible
Leverage the JEB API to automate reverse engineering tasks.
Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.

 

ARM Decompiler
Use JEB to reverse engineer programs and malware written for ARM platforms.
Our ARM machine code decompiler allows reverse engineers and security auditors to analyze malicious ARM binary files.

The ARM decompiler provides the following features:

  • Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of ARM 32-bit and ARM-Thumb code to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API to perform advanced and/or automated code analysis in Python or Java.

 

MIPS Decompiler
Use JEB to reverse engineer MIPS embedded programs and malware.
Our MIPS processor and microcontroller machine code decompiler allows reverse engineers and security auditors to analyze malicious MIPS programs and audit complex embedded systems (routers, set-top boxes, IOT devices, etc.).

The MIPS decompiler provides the following unmatched features:

  • Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of MIPS 32-bit to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API to perform advanced and/or automated code analysis in Python or Java.

 

Intel Decompiler
Use JEB to reverse engineer x86 32-bit and x86 64-bit programs and malware.
Our Intel x86 and Intel x86-64 decompilers are part of JEB 3 Pro and Pro Floating.

The x86 decompiler and x86-64 decompiler provide the following features:

  • Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of x86 and x86-64 to pseudo-C source code.
  • Partial Class Recovery and Decompilation to C++ for programs compiled with MS VCPP (see video).
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Win32 type libraries and common signatures for efficient Windows file analysis.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API and access to the Intermediate Representations to perform advanced and/or automated code analysis in Python or Java.

 

WebAssembly Decompiler
Use JEB to reverse engineer WebAssembly binary modules.

The WebAssembly plugins provide the following features:

  • Augmented disassembly and parsing of wasm binary modules.
  • Decompilation of wasm bytecode to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer for typing/renaming/commenting/cross-referencing, etc.
  • Full API access for scripting and plugins.

JEB WebAssembly plugins can also be used to decompile Smart Contracts compiled to wasm, such as EOS or Parity contracts.

 

Ethereum Decompiler
Use JEB to reverse engineer Ethereum opaque smart contracts and dApps to Solidity-like high-level code.
Cut down on costly reverse engineering time: decompile Ethereum smart contracts to Solidity-like source code to easily understand and review closed-source contracts and dApps.

  • Decompile EVM contract code to Solidity-like high-level code using our Ethereum decompiler.
  • Annotate the analysis results to better understand what the compiled contract or dApp is doing.
  • Automate or script your reverse engineering tasks via our API.

 

PDF Document Analyzer
Analyze malicious Adobe™ PDF files using the best PDF document analyzer in the industry.
Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.

Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.

  • Break-down the PDF structure into a visually compelling and navigable tree.
  • Deal with corrupt files, complex streams (eg, multiple encodings, etc.).
  • Retrieve 20+ notifications and alerts generated by the analyzer to pin-point suspicious areas and use them to issue a determination on the file.
  • Extract embedded Javascript even in the most extreme cases.
  • Automate the reverse engineering process via the JEB API to perform bulk analysis.

 

Analyze Anything
Leverage the JEB API to write custom modules to handle virtually any file type.
We do provide training for power‑users that wish to use the API to its full extent.
Our community of users also share free open‑source modules, plugins, scripts and tutorials for developers.

JEB requires a recent Java SE Development Kit (JDK) version 8.

 Java Version 

JEB is tested using JDK 8. It is the version we recommend (8u261 as of July 2020). JEB should also work properly with version 9/10/11 of the JDK. However at the time of writing, we advise against JDK 12/13/14/15, as some components may not work as intended.

 版本介紹

License Type
JEB Android
JEB Pro
JEB Pro Floating
List of analysis modules
Android modules All modules  All modules
JEB with official UI client
V V V
Support for extensions
(plugins and scripts)
V V V
Work without an Internet connectio
  V V
Execute third-party front-end clients   V V
Floating seats
    V

 

JEB Home Edition
We released JEB Home Edition x86 in January 2019. It is the ideal product if you are an individual wishing to reverse engineer binary files of all sorts compiled for Intel x86 and x86-64.
JEB is a full-featured, mature platform, and we encourage you to review the full product description by checking the link below.

  • Support most code object files: Windows PE (EXE binaries, DLL libraries, SYS drivers), Linux ELF, Mach-O, headless firmware, etc.
  • Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of x86 and x86-64 to C-like source code.
  • Advanced optimization passes to thwart protected or obfuscated code. Power users can craft their own optimizers (example)
  • Win32 type libraries, Kernel type libraries for efficient Windows file analysis. Power-users can generate their own typelibs as well (details)
  • Signature libraries of common SDK, including all versions of Microsoft Visual Studio.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API and access to the Intermediate Representations to perform advanced and/or automated code analysis in Python or Java (details)
  • (Coming soon) Partial Class Recovery and Decompilation to C++ for programs compiled with MS VCPP (Beta access - demo video).

 


版本比較表

  JEB x86
Home Edition
JEB Android JEB Pro
Decompilers
Dalvik Decompiler   V V
Java Decompiler   V V
ARM Decompiler   V V
ARM64 Decompiler   V V
MIPS Decompiler     V
Intel x86 Decompiler V   V
Intel x86-64 Decompiler V   V
WebAssembly Decompiler     V
Ethereum Decompiler for Smart Contracts (EVM Decompiler)     V
Libra Decompiler for libravm/Move modules (open-sourced)     V
Atmel AVR 8-bit Decompiler (Coming Soon)     2021Q1
Base Plugins
Archive files (zip, 7z, tar) V V V
Image files (bmp, png, jpg, gif, ico) V V V
Structured text files (html, xml, json) V V V
Certificate files (x.509) V V V
Application Processors
Android APK (incl. dex, odex, x-apk)   V V
Windows PE/PE64/COFF, PDB V V V
Linux ELF/ELF64 V V V
Mach-O, Mach-O/FAT V V V
Intel HEX (ihex) V V V
Chrome Extension (crx) V V V
WebAssembly module (wasm)   V V
Ethereum contracts (evm)   V V
Disassemblers
Dalvik Disassembler   V V
Intel x86 Disassembler V V V
Intel x86-64 (AMD64) Disassembler V V V
ARM (32, Thumb) Disassembler   V V
ARM64 (Aarch64) Disassembler   V V
MIPS Disassembler   V V
Atmel AVR 8-bit Disassembler   V V
Debuggers
Dalvik Debugger (Android)   V V
Intel x86 Debugger (GDB/LLDB all platforms, incl. Android) V V V
Intel x86-64 Debugger (GDB/LLDB all platforms, incl. Android) V V V
ARM Debugger (GDB/LLDB all platforms, incl. Android)   V V
ARM64 Debugger (GDB/LLDB all platforms, incl. Android)   V V
MIPS Debugger (GDB/LLDB all platforms, incl. Android)   V V
Document Parsers
Adobe PDF     V
FAT file systems (file access table)   V  V(plugin)
Platform
Persist JEB Projects to JDB2 Databases V V V
Interactivity (refactoring, renaming, commenting, etc.) V V V
Graphing (CFG, Callgraphs, etc.) V V V
Support for multiple Artifacts in a same Project   V V
Extensions - Client scripts in Python V V V
Extensions - Back-end plugins in Java   V V
Works offline     V

 

產品目錄

商務工具
  • 專案管理
  • 文檔管理
  • 自動排程
  • 流程管理
  • 條碼製作
  • 列印管理
應用軟體
  • 行事管理
  • 桌面管理
  • 翻譯軟體
  • 傳真伺服器
  • 英語學習
  • 其他應用
  • 光碟工具
開發及程式工具
  • 資料庫開發管理
  • Java & XML
  • 程式碼編輯
  • 程式碼檢查
  • 虛擬裝置
  • 終端機與伺服器
  • 軟體封裝
  • 開發追蹤檢測
  • ASP 工具
  • PHP 工具
  • C++ 工具
  • 日誌分析
  • 電路板設計
  • 開發整合工具
  • 驅動程式開發
  • OPC 工具
  • 圖表開發程式
系統工具
  • 作業系統
  • 磁碟工具
  • 系統優化
  • 效能測試
  • 裝置分析
  • 壓縮工具
傳輸.遠控.郵件
  • FTP伺服器/傳輸
  • 網路通訊
  • 檔案傳輸
  • 遠端控制
  • 網域管理
  • 郵件軟體
資訊安全工具
  • 還原備份
  • 網路監控
  • 系統安全
  • 電腦防毒
  • 資料保護
  • 網路安全
  • 網路分析
  • USB 監控
文書處理
  • 文書管理
  • 文書編輯
  • 文書轉檔
  • 方程式編輯
  • 說明文製作
  • 論文編輯
PDF 應用
  • PDF 編輯
  • PDF 轉檔
  • PDF 加解密
  • Acrobat 插件
網頁相關
  • 網頁設計
  • 網頁瀏覽
  • 網頁安全
  • 網頁分析
  • 網頁打包及管理
圖表編輯
  • 圖表開發程式
  • 圖表製作
  • 圖像編輯
  • 3D 繪圖
  • 圖檔轉換
  • 影像擷取
  • 流程圖製作
簡報排版
  • 字型設計
  • 排版設計
  • 地圖繪製
  • 簡報及電子書
影音軟體
  • 樂曲製作
  • 視頻編碼
  • 影像錄製
  • Flash 製作
  • 動畫製作
  • 影像圖庫
  • 影音分析
  • 影音播放
  • 影音編輯
  • 錄音軟體
  • 字幕軟體
統計分析軟體
  • 統計分析
  • 結構分析
  • 時間序列分析
  • 計量分析
  • 統計流程控制
  • 社會網絡分析
數值分析軟體
  • 決策分析
  • 數值運算
  • 人工智慧
  • 質性分析
  • 生命週期評估
學術研究軟體
  • 化學軟體
  • IRT 應用
  • 生物軟體
  • 水利軟體
  • 視覺思考
  • 數學軟體
  • 互動教學
  • 醫學軟體
  • 物理分析
  • 認知心理
友環股份有限公司   版權所有 2007-2021 Linksoft Inc. All Rights Reserved.

地址: 23504新北市中和區中山路二段351號6樓之10
 
電話: +886-2-2221-2155
 
傳真: +886-2-2221-9008

[email protected]  
http://www.linksoft.com.tw  
關於友環  
聯絡我們   Facebook關注  

會員登入

忘記密碼

會員註冊

Linksoft友環專業軟體代理網站服務,不論會員或非會員均可享受產品詢價和訂購服務。
欲加入會員,可以點選「註冊」成為會員。

加入會員的好處:

1. 您可以隨時登入會員,查詢產品詢價記錄,更新您的會員資料。
2. 系統將自動帶出您的會員資料,免去資料重複繕打的麻煩。
3. 只需填寫基本的聯絡資料,不會要求您留下身份證字號等個人機密性資料。
4. 掌握最新的產品資訊及最新好康,享受完整的客戶服務,註冊的聯繫Email可立即收到通知,再也不用怕漏失重要訊息。

忘記密碼