All Projects → Konloch → Bytecode Viewer

Konloch / Bytecode Viewer

Licence: gpl-3.0
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)

Programming Languages

java
68154 projects - #9 most used programming language
HTML
75241 projects

Projects that are alternatives of or similar to Bytecode Viewer

java-decompiler
A Docker image that combines the strength of four popular Java decompilers (CFR, Fernflower, Krakatau, and Procyon) 🚀🔨
Stars: ✭ 50 (-99.6%)
Mutual labels:  java-decompiler, fernflower, cfr, procyon, krakatau
dex2jar
Tools to work with android .dex and java .class files
Stars: ✭ 102 (-99.19%)
Mutual labels:  smali, dex2jar, baksmali
Andromeda
Andromeda - Interactive Reverse Engineering Tool for Android Applications
Stars: ✭ 627 (-95.03%)
Mutual labels:  apk, static-analysis
Apk Dependency Graph
Android class dependency visualizer. This tool helps to visualize the current state of the project.
Stars: ✭ 675 (-94.65%)
Mutual labels:  apk, smali
Droidjack
Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-99.65%)
Mutual labels:  apk, smali
Obfuscapk
An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
Stars: ✭ 456 (-96.38%)
Mutual labels:  apk, smali
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-95.94%)
Mutual labels:  apk, smali
Befa Library
High-level library for executable binary file analysis
Stars: ✭ 12 (-99.9%)
Mutual labels:  decompiler, static-analysis
Rascal
The implementation of the Rascal meta-programming language (including interpreter, type checker, parser generator, compiler and JVM based run-time system)
Stars: ✭ 284 (-97.75%)
Mutual labels:  compiler, static-analysis
Vab
V Android Bootstrapper
Stars: ✭ 77 (-99.39%)
Mutual labels:  apk, compiler
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (-18.99%)
Mutual labels:  apk, static-analysis
Reading
A list of computer-science readings I recommend
Stars: ✭ 1,919 (-84.78%)
Mutual labels:  compiler, static-analysis
Reverseapk
Quickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-96.68%)
Mutual labels:  apk, smali
Bytecoder
Rich Domain Model for JVM Bytecode and Framework to interpret and transpile it.
Stars: ✭ 401 (-96.82%)
Mutual labels:  compiler, decompiler
Felix
The Felix Programming Language
Stars: ✭ 609 (-95.17%)
Mutual labels:  compiler, static-analysis
Adhrit
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (-96.83%)
Mutual labels:  apk, smali
Fakerandroid
A tool translate a apk file to stantard android project include so hook api and il2cpp c++ scaffolding when apk is a unity il2cpp game. Write code on a apk file elegantly.
Stars: ✭ 695 (-94.49%)
Mutual labels:  apk, smali
Backdoor Apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Stars: ✭ 1,766 (-85.99%)
Mutual labels:  apk, smali
ApkDecompiler
【Linux系统】上apk反编译助手,已打包为ApkDecompiler.deb,支持debian系linux,如debian、ubuntu、mint、deepin等等
Stars: ✭ 34 (-99.73%)
Mutual labels:  apk, dex2jar
apk-decompiler
Small Rust utility to decompile Android apks
Stars: ✭ 48 (-99.62%)
Mutual labels:  decompiler, apk

Bytecode Viewer

Bytecode Viewer - a lightweight user-friendly Java/Android Bytecode Viewer, Decompiler & More.

New Features

  • Dark mode with multiple themes
  • Translated into over 30 languages including: Arabic, German, Japanese, Mandarin, Russian, Spanish
  • Plugin Writer - create and edit external plugins from within BCV
  • Fixed Java & Bytecode editing/compiling
  • Tabbed plugin console
  • Right-click menus on the resource and search panels
  • Javap disassembler
  • XAPK support
  • Updated nearly all dependencies (incl. decompilers like CFR, JD-GUI etc.)
  • Updated ASM library to version 9.1
  • Added support to Java files compiled using JDK > 13
  • Migrated to Maven

v2.10.x Notes

  • The rewrite/refactoring process is currently ongoing so please report any bugs you find
  • If you're encountering any issues try using v2.9.22

Links

Key Features

  • Simply drag and drop to decompile and search Java Jars & Android APKs
  • File format support for: Class, Jar, XAPK, APK, DEX, WAR, JSP, Image Resources, Text Resources & More
  • 6 Built-in Java decompilers: Krakatau, CFR, Procyon, FernFlower, JADX, JD-GUI
  • 3 Built-in Bytecode disassemblers, including 2 assemblers: Krakatau and Smali/BakSmali
  • APK/DEX Support from Dex2Jar and Enjarify
  • Built-in Java Compiler
  • Advanced static-search functionality
  • Customizable UI
  • Plugins + Script Engine Design
  • Malicious code scanning API
  • Translated Into over 30 Languages Including: Arabic, German, Japanese, Mandarin, Russian, Spanish)
  • Export functionality as Runnable Jar, Zip, APK, Decompile All As Zip, Etc.
  • And more! Give it a try for yourself!

Command Line Input

	-help                         Displays the help menu
	-clean                        Deletes the BCV directory
	-english                      Forces English language translations
	-list                         Displays the available decompilers
	-decompiler <decompiler>      Selects the decompiler, procyon by default
	-i <input file>               Selects the input file (Jar, Class, APK, ZIP, DEX all work automatically)
	-o <output file>              Selects the output file (Java or Java-Bytecode)
	-t <target classname>         Must either be the fully qualified classname or "all" to decompile all as zip
	-nowait                       Doesn't wait for the user to read the CLI messages

What is Bytecode Viewer?

Bytecode Viewer (BCV) is an Advanced Lightweight Java/Android Reverse Engineering Suite. Powered by several open source tools BCV is designed to aid in the reversing process.

BCV comes with 6 decompilers, 3 disassemblers, 2 assemblers, 2 APK converters, advanced searching, debugging & more.

It's written completely in Java, and it's open sourced. It's currently being maintained and developed by Konloch.

Is there a demo?

BCV Demo

Please note this demo is from a very old version

How do I install BCV?

Download the latest version from https://github.com/konloch/bytecode-viewer/releases and run the Bytecode-Viewer-2.10.x.jar. You may need to execute it via command line java -jar Bytecode-Viewer-2.10.x.jar (replace the X with the current minor version)

How can I use BCV?

  • Starting with a Jar, Zip, ClassFile or Android file (APK, DEX, XAPK, etc) drag it into BCV. It will start the decoding process automatically.
  • From here you can select the decompilers you would like to use by selecting the View Pane>View 1, View 2, View 3, etc.
  • The view panes are-used to display up to 3 decompilers side by side, you can also toggle edibility here.
  • Select the resource you would like to open by navigating using the resource list, BCV will do its best to display it (Decompiling, Disassembling, etc).
  • You can use plugins to help you search along with using the search pane in the left-hand bottom corner.

How do the plugins work?

There is also a plugin system that will allow you to interact with the loaded classfiles. You could for example write a String deobfuscator, a malicious code searcher, or anything else you can think of.

You can either use one of the pre-written plugins, or write your own. The plugin system supports java and javascript scripting.

Once a plugin is activated, it will execute the plugin with a ClassNode ArrayList of every single class loaded in BCV, this allows the user to handle it completely using ASM.

Instructions to compile

Just clone this repo and run mvn package. It's that simple!

Working on the source

Open the Maven project (e.g. in IntelliJ, open the pom.xml as a project file).

Java Heap Space Issues (java.lang.OutOfMemoryError)

Start BCV with more RAM, e.g. java -Xmx3G -jar BCV.jar

File Permission Issues (java.io.FileNotFoundException)

Right click on the jar file, go to Properties, and select Unblock under Security at the bottom of the General tab.

APK File Permission Issues (java.io.FileNotFoundException)

Run BCV as administrator.

Are you a Java Reverse Engineer? Do you want to learn?

Join The Bytecode Club Today! - https://the.bytecode.club

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].