decompiler
Here are 180 public repositories matching this topic...
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
-
Updated
Jul 26, 2020 - Java
.NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!
-
Updated
Sep 4, 2020 - C#
Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
-
Updated
Aug 8, 2020 - Java
When class/field/member modifier groups are displayed, its a stack of colored shapes.
It would be useful to have on-hover capabilities for these groups to complain the flags enabled in each group.
See AccessFlags for the list of all flags.
It would be u
Reko is a binary decompiler.
-
Updated
Sep 2, 2020 - C#
A toolset for reverse engineering and fuzzing Protobuf-based apps
-
Updated
May 3, 2020 - Python
Tool to decompile & extract Android Dex bytecode from Vdex files
-
Updated
May 13, 2020 - C
Avalonia-based .NET Decompiler (port of ILSpy)
-
Updated
Jun 22, 2020 - C#
IDAPython plugin that synchronizes disassembler and decompiler views
-
Updated
May 30, 2019 - Python
Rich Domain Model for JVM Bytecode and Framework to interpret and transpile it.
-
Updated
Sep 4, 2020 - Java
Components of a decompilation pipeline.
-
Updated
Jun 9, 2020 - Go
radare2 plugin - converts asm to pseudo-C code.
-
Updated
Aug 27, 2020 - C
Currently, accessing Bindings in RadecoFunction is not elegant. We should improve support for this. This should also be extended to improve accessing of type and other node information related to these bindings.
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
-
Updated
Aug 30, 2020 - Python
Currently, decompilation of Windows executables produces unreadable and/or semantically wrong output because the signatures for most of the Windows API functions are missing. We should add signatures for at least the most commonly used ones.
Currently, creating a new script and/or adding variables through the GUI is a thousand-step process that could really see some improvement.
Adding a Variable
First of all, the most critical issue - creating an UndertaleVariable through the context menu is currently not possible due to them not being an UndertaleNamedResource (so when the editor tries to read the name of the newly created vari
.NET Patcher library using dnlib
-
Updated
Dec 26, 2019 - C#
Unity IL2CPP Disassembler (for apk)
-
Updated
Aug 7, 2020 - Python
Advanced and easy to use penetration testing framework
-
Updated
Aug 20, 2019 - Python
Python decompiler for 3.7+. Stripped down from uncompyle6 so we can refactor and fix up some long-standing problems
-
Updated
Aug 15, 2020 - Python
Those that don't need it, that is. Which are basically all of the clang::RecursiveASTVisitor derived classes in rellic/AST/.
Improve this page
Add a description, image, and links to the decompiler topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the decompiler topic, visit your repo's landing page and select "manage topics."


Tested on latest v6.1.7.
If an assembly has been loaded from memory, it's impossible to search.
IE. Assembly.Load(byte[])
When an assembly like this is loaded into dnSpy, the search feature throws an exception: