ee

Call number
02-711-3631/3
Fax
02-711-3632
Time
평일 09:00 ~ 18:00
토요일,일요일,공휴일 휴무 호스팅사업자:https://www.cafe24.com/
smhan@sigmasoft4u.com
국민은행 600201-01-055965
예금주 : 한상민(시그마소프트)
   현재위치 : HOME > 연구용소프트웨어
 
 
JEB Decompiler_Pro(formerly Business)_12months 연간구독
쿠폰정보 : 본 상품은 쿠폰이 적용된지 않는 상품입니다.
판매가격 : [전화문의]
원산지 : 미국
제조사 : PNF Software
제품선호도 : 제품 평가 전 입니다.
무이자할부 :
▒ 주문수량 :
 

JEB

JEB is our reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.

Android Decompiler + Android Debuggers

Use JEB to perform reverse engineering of malicious APKs and security audits.

Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.

Perform static and dynamic analysis of Android applications, goodware or badware, small or large.

  • Decompile code using our Dalvik decompiler, including multi-dex APK.
  • Refactor the analysis to defeat obfuscated code generated by application protectors.
  • Reconstruct resources and obfuscated XML files.
  • Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
  • Automate and script your reverse engineering tasks via our API.

Powerful

Perform precise and robust decompilation of Android apps and Dalvik bytecode.

Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).

Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.

Flexible

Refactor, annotate, navigate, and modify the analysis output.

Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).

Extensible

Leverage the JEB API to automate reverse engineering tasks.

Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.

ARM Decompiler

Use JEB to reverse engineer programs and malware written for ARM platforms.

Our ARM machine code decompiler allows reverse engineers and security auditors to analyze malicious ARM binary files.



The ARM decompiler provides the following features:

  • Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of ARM 32-bit and ARM-Thumb code to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API to perform advanced and/or automated code analysis in Python or Java.

MIPS Decompiler

Use JEB to reverse engineer MIPS embedded programs and malware.

Our MIPS processor and microcontroller machine code decompiler allows reverse engineers and security auditors to analyze malicious MIPS programs and audit complex embedded systems (routers, set-top boxes, IOT devices, etc.).



The MIPS decompiler provides the following unmatched features:

  • Augmented disassembly including resolution of dynamic callsites and syscalls, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of MIPS 32-bit to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API to perform advanced and/or automated code analysis in Python or Java.

Intel Decompiler

Use JEB to reverse engineer x86 32-bit and x86 64-bit programs and malware.

Our Intel x86 and Intel x86-64 decompilers are part of JEB 3 Pro and Pro Floating.



The x86 decompiler and x86-64 decompiler provide the following features:

  • Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation of x86 and x86-64 to pseudo-C source code.
  • Partial Class Recovery and Decompilation to C++ for programs compiled with MS VCPP (see video).
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Win32 type libraries and common signatures for efficient Windows file analysis.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Full API and access to the Intermediate Representations to perform advanced and/or automated code analysis in Python or Java.

WebAssembly Decompiler

Use JEB to reverse engineer WebAssembly binary modules.



The WebAssembly plugins provide the following features:

  • Augmented disassembly and parsing of wasm binary modules.
  • Decompilation of wasm bytecode to pseudo-C source code.
  • Advanced optimization passes to thwart protected or obfuscated code.
  • Interactive layer for typing/renaming/commenting/cross-referencing, etc.
  • Full API access for scripting and plugins.

JEB WebAssembly plugins can also be used to decompile Smart Contracts compiled to wasm, such as EOS or Parity contracts.

Read our technical paper "Reverse Engineering WebAssembly"

PDF Document Analyzer

Analyze malicious Adobe™ PDF files using the best PDF document analyzer in the industry.

Our PDF module breaks down and decodes PDF files to provide access to its inner components such as resources and scripts. It detect structure corruptions and issues notifications to report suspicious areas. Leverage the PDF module either through the desktop client or a headless client, such as a file analyzer stack or automation pipeline.

Use our PDF analyzer to manually or automatically reverse engineer documents of all sizes.

  • Break-down the PDF structure into a visually compelling and navigable tree.
  • Deal with corrupt files, complex streams (eg, multiple encodings, etc.).
  • Retrieve 20+ notifications and alerts generated by the analyzer to pin-point suspicious areas and use them to issue a determination on the file.
  • Extract embedded Javascript even in the most extreme cases.
  • Automate the reverse engineering process via the JEB API to perform bulk analysis.

Analyze Anything

Leverage the JEB API to write custom modules to handle virtually any file type.

We do provide training for power‑users that wish to use the API to its full extent.

Our community of users also share free open‑source modules, plugins, scripts and tutorials for developers.

Features Matrix

A detailed chart of which analysis modules are bundled with our various license types.

      Subscription Type >
JEB Android
JEB Emb.
JEB Pro
Decompilers
Dalvik Decompiler
MIPS Decompiler
ARM Decompiler
ARM64 Decompiler
Intel x86 Decompiler
Intel x86-64 Decompiler
WebAssembly Decompiler
Base Plugins
Archive files (zip, 7z, tar)
Image files (bmp, png, jpg, gif, ico)
Structured text files (html, xml, json)
Certificate files (x.509)
Application Processors
Android APK (incl. dex, odex, x-apk)
Windows PE/PE64/COFF
Linux ELF/ELF64
Mach-O, Mach-O/FAT
Intel HEX (ihex)
Chrome Extension (crx)
WebAssembly module (wasm)
Disassemblers
Dalvik Disassembler
Intel x86 Disassembler
Intel x86-64 (AMD64) Disassembler
ARM (32, Thumb) Disassembler
ARM64 (Aarch64) Disassembler
MIPS Disassembler
Atmel AVR Disassembler
Debuggers
Dalvik Debugger (Android)
Intel x86 Debugger (GDB/LLDB all platforms, incl. Android)
Intel x86-64 Debugger (GDB/LLDB all platforms, incl. Android)
ARM Debugger (GDB/LLDB all platforms, incl. Android)
ARM64 Debugger (GDB/LLDB all platforms, incl. Android)
MIPS Debugger (GDB/LLDB all platforms, incl. Android)
Document Parsers
Adobe PDF
FAT file systems (file access table) (plugin)
Graphical Desktop Client
Interactivity
Graphing
Support for multiple Artifacts in a same Project
 
위 상품과 관련된 상품이 없습니다.
 
고객상품평은 개인적인 소견을 담은 내용으로써 사실과 다르거나 보는 사람에 따라 차이가 있을 수 있으며..
관리자에 의해서 부합되지 않은 상품평은 삭제될 수도 있습니다.
아직 작성된 상품평이 없습니다.
 
 
제품을 구입하시는데 있어 궁금하신사항이 있으시면 문의를 남겨주세요.
고객님들께서 보다 안정적이고 쉽게 상품을 구입할 수 있도록 최선을 다하겠습니다.
해당 상품의 질문이 없습니다.
 
 
구입제품의 이상이 있을 경우

- 구입후 7일 이내에 동일제품으로 교환 가능하며 운송비는 판매자 부담입니다.

- 다른 제품으로 교환, 또는 이상이 없는 제품과 함께 교환을 원하실 경우 구매자께서 운송비를 부담합니다.

----------------------------------------------------------------

구입 후 30일 이내에는 반품과 환불이 가능하나, 소프트웨어 및 Document 들, 메뉴얼이나 등록카드 등 제반 내용물들이 손상되지 않아야 하며, 사용 흔적이 없어야 합니다.



반품 요청서를 작성하시어 당사로 팩스나 우편으로 보내주시면, 당사는 확인 후 반품 승인 번호를 통보 드립니다.

고객께서는 이 반품 승인 번호를 반드시 수령하신 후 반송 바랍니다. 반품 승인 번호가 없는 반송은 받지 않습니다.

반송은 택배나 등기우편으로 보내셔야 하며, 운임은 고객의 부담입니다.

반품 해당 금액의 다른 제품으로 교환 하시거나 해당 금액을 구매 고객 명의 은행 구좌를 통해 입금 해드립니다.

두번 이상의 반품은 불가하며, 반송 제품에 하자가 있는 경우에는 반품이 불가하오니 양지하시기 바랍니다.

반품결정 → 반품요청서 송부 → 반품 승인번호 수령 → 반송 → 제품의 이상 유무 확인 → 교환 또는 환불

절차와 제품에 하자가 없는 경우 24 시간 이내 완료





구입제품의 이상이 있을 경우 (색상,사이즈,다른상품교환

- 구입후 7일이내 교환 가능하며 구매자께서 운송비를 부담합니다.



!! 주의사항

비닐포장 및 Tag의 폐기 또는 훼손 등으로 상품 가치가 멸실된 경우에는 제한.

반품시에 해당 사은품이 있을 경우 같이 보내주셔야 합니다.
 
결제후 2~5일 이내에 상품을 받아 보실 수 있습니다.(재고 소진시 2주)

한진택배를 통하여 신속하고 안전하게 배송됩니다.

5만원 이상 구입시 무료배송입니다.

(제주도를 포함한 도서,산간지역은 항공료 또는 도선료가 추가됩니다.)
 
결제방법은 신용카드, 국민/BC(ISP), 무통장입금, 적립금이 있습니다.

정상적이지 못한 결제로 인한 주문으로 판단될 때는 임의로 배송이 보류되거나,주문이 취소될 수 있습니다.

상담시간    평일 09:00 ~ 18:00 토요일,일요일,공휴일 휴무 호스팅사업자:https://www.cafe24.com/
상담 및 문의전화    02-711-3631/3 ( smhan@sigmasoft4u.com )

상호 : 시그마소프트   |   (우)04366 서울특별시 용산구 원효로 128(원효로3가,원효로오피스텔 1306호)
사업자등록번호 : 106-08-67756   |   통신판매업신고 : 제2008-서울용산-0987호
대표 : 한상민   |   개인정보 관리책임자 : 한상민   |   개인정보 보호기간 : 회원탈퇴시
0 EA
no img