JEB Decompiler for ARM


Our ARM decompilers give reverse engineers and security auditors efficient ways to analyze malicious ARM programs and audit complex embedded systems.


Our ARM 32-bit (aarch32/a32, thumb) and ARM 64-bit (aarch64/a64) decompilers provide the following features:

  • Augmented disassembly including resolution of dynamic callsites, candidate values determination for registers, dynamic cross-references, etc.
  • Decompilation to pseudo-C source code.
  • Advanced optimization passes to thwart protected code and clean-up obfuscation.
  • Interactive layer allowing refactoring: type definition, stackframe building, renaming/commenting/cross-referencing, etc.
  • Type libraries for Linux, and Android-Linux, and Windows.
  • Full API to create custom plugins at the IR or AST levels, and perform automated code analysis in Python or Java.