Bytecode Viewer is participating 2021 OSC China Open Source Project Selection , please vote for it!
Bytecode Viewer in 2021 OSC China Open Source Project Selection {{projectVoteCount} has been obtained in, please vote for it!
2021 OSC China Open Source Project Selection It is in hot progress. Come and vote for your favorite open source project!
2021 OSC China Open Source Project Selection>>> Midfield Review
Bytecode Viewer won the 2021 OSC China Open Source Project Selection "The Best Popularity Project" !
Authorization Agreement GPL 3.0
development language Java
operating system Cross platform
Software type Open source software
Classification development tool Decompiler
Open source organizations nothing
region Unknown
deliverer Rocky
intended for unknown
Recording time 2022-06-19

Software Introduction

Bytecode Viewer (BCV Bytecode Viewer) is an advanced lightweight Java/Android reverse engineering suite that can analyze Java 8+Jar files and Android APK files. It has 6 decompilers, 3 decompilers, 2 assemblers, 2 APK converters, advanced search, debugging, and other functions.

major function

  • Just drag and drop to decompile and search Java Jars and Android APK
  • File format support: Class Jar、XAPK、APK、DEX、WAR、JSP、 Image resources, text resources, etc
  • 6 built-in Java decompilers: Krakatau CFR、Procyon、FernFlower、JADX、JD-GUI
  • Three built-in bytecode disassemblers, including two: Krakatau and Smali/BakSmali
  • APK/DEX support from Dex2Jar and Enjarify
  • Built in Java compiler
  • Advanced static search function
  • Customizable user interface
  • Plug in+script engine design
  • Malicious code scanning API
  • Translated into more than 30 languages, including Arabic, German, Japanese, Mandarin, Russian and Spanish)
  • Export functions as Runnable Jar, Zip, APK, decompile to Zip, etc.

How to use BCV?

  • Start with a Jar, Zip, ClassFile or Android file (APK, DEX, XAPK, etc.), drag it into the BCV, and the BCV will automatically start the decoding process.
  • You can select the decompiler you want to use by selecting View Pane>View 1, View 2, View 3, etc.
  • The view pane displays up to 3 decompilers side by side, where you can switch editability.
  • By using the resource list navigation to select the resource to be opened, the BCV will display the relevant resource information
  • You can use plug-ins to search and use the search pane in the lower left corner.

Expand to read the full text

code

Gitee index of is
exceed Items for

comment

Click to lead the topic 📣 Post and join the discussion 🔥
No content temporarily
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Issued a question and answer
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Google protobuf security vulnerability
Incorrect behavior order
Google protobuf is a data exchange format of Google in the United States. There is a security vulnerability in protobuf java, which allows a small malicious load to occupy the parser for several minutes by creating a large number of short-term objects that cause frequent and repeated pauses.
CVE-2021-22569 MPS-2021-19066
2022-08-08 18:07
Com. beust: jcommander contains function routine vulnerability from untrusted control range
Com. beust: jcommander is the command line parsing framework of Java. Because the dependency on the insecure channel (http) is resolved, the affected version of this package is vulnerable to the resolution of the insecure dependency.
MPS-2022-12225
2022-08-08 18:07
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
zero comment
eight Collection
 OSCHINA
Log in to view more high-quality content
 Back to top
Top