|Original author(s)||Nicolas Falliere|
|Developer(s)||PNF Software, Inc.|
2.3.13 / April 3, 2018
|Operating system||Microsoft Windows, Mac OS X, Linux|
|Platform||Java, Eclipse RCP|
JEB is a disassembler and decompiler software for Android applications and native machine code. It decompiles Dalvik bytecode to Java source code, and MIPS and ARM machine code to C source code. The assembly and source outputs are interactive and can be refactored. Users can also write their own scripts and plugins to extend JEB functionality.
JEB 2.2 introduced Android debugging modules for Dalvik and native (Intel, ARM, MIPS) code. Users can "seamlessly debug Dalvik bytecode and native machine code, for all apps [...] including those that do not explicitly allow debugging".
JEB 2.3 introduced native code decompilers. It currently ships with a MIPS 32-bit interactive decompiler, as well as the beta of an ARM decompiler.
JEB is the first Dalvik decompiler to provide interactive output, as reverse-engineers may examine cross-references, insert comments, or rename items, such as classes and methods. Whenever possible, the correspondence between the bytecode and the decompiled Java code is accessible to the user.
Although JEB is branded as a decompiler, it also provides a full APK view (manifest, resources, certificates, etc.).
The name may be a reference to the well-known security software IDA, as "JEB" = rot1("IDA").
JEB version 2
JEB2 allows parsing of any file format, via the addition of native or third-party plugins (examples: XLS and MIPS, PDF, etc.). The official primary front-end is based on the Eclipse Foundation Rich Client Platform framework. Unlike JEB1, JEB2 allows third-party to develop the development of custom front-end.