Logo
Sign in
Product Logo
JEB Decompiler for RISC-VPNF Software

Cut down on reverse engineering time: use the interactive RISC-V decompilers to analyze RV32/RV64 binaries.

Vendor

Vendor

PNF Software

Company Website

Company Website

riscv_example_unzip_cropped_annotated.png
Product details

Overview

JEB Decompiler for RISC-V is a powerful tool designed to analyze RV32 and RV64 binaries efficiently. It supports various ISA extensions, including integer, multiply, atomic, single-float, double-float, and compressed opcodes. The decompiler is ideal for reverse engineering and security audits, providing augmented disassembly, decompilation to pseudo-C source code, and advanced optimization passes. JEB's RISC-V decompilers are essential for deep diving into RISC-V code, handling dynamic callsites, candidate values for registers, and dynamic cross-references.

Features

  • Code Object Files: Support for RISC-V in Linux ELF, Windows PE, or headless code (e.g., firmware).
  • Disassembler: Support for RV32/RV64, regular and compressed opcodes for various ISA extensions.
  • Decompilation: Support for RVI (integer/general-purpose operations) for 32-bit and 64-bit, with planned support for floating-point instructions.
  • Relocations: Support for common ELF relocations specific to RISC-V, handling common PLT resolver stubs.
  • Calling Conventions: Support for ILP32D and LP64D calling conventions, with the ability to define custom conventions.
  • Type Libraries: Reuse ARM or MIPS type libraries for Linux 32/64 or Windows 32/64.
  • Interactive Layer: GUI client for interactive refactoring, including renaming, commenting, cross-referencing, type definition, and stackframe building.
  • Advanced Analysis: Detect tail-calls, non-returning methods, switch-like idioms, and more.
  • Optimization Passes: Advanced decompiler optimization passes to thwart protected or obfuscated code.
  • Signature Libraries: Traditional and codeless signature libraries for common SDKs and libraries.
  • Full API Access: Perform advanced and automated code analysis in Python or Java.
  • Safe Emulation: Safe emulation for in-place decryption of obfuscated code.

Benefits

  • Efficiency: Reduce reverse engineering time by decompiling obfuscated RISC-V binaries and examining code quickly.
  • Comprehensive Analysis: Perform thorough analysis with augmented disassembly, decompilation, and optimization techniques.
  • Flexibility: Customize and automate reverse engineering tasks using the JEB API.
  • Security Audits: Conduct detailed security audits to identify vulnerabilities and ensure application integrity.
  • Ease of Use: Utilize an interactive GUI client for efficient refactoring and analysis.
  • Integration: Seamlessly integrate with other tools and workflows to enhance productivity and collaboration.