bytecode-viewer
by Konloch
Bytecode Viewer is a lightweight, user-friendly Java and Android reverse engineering suite featuring multiple decompilers, editors, and debugging tools.
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Primary Use Case
This tool is primarily used by security researchers, malware analysts, and developers to reverse engineer Java and Android applications by decompiling, editing, and analyzing bytecode and APK files. It facilitates malware analysis, exploitation research, and security automation by providing an integrated environment for static code inspection and modification.
- Supports drag and drop decompilation of Java Jars and Android APKs
- Includes 6 built-in Java decompilers (Krakatau, CFR, Procyon, FernFlower, JADX, JD-GUI)
- Features 3 bytecode disassemblers and 2 assemblers (Krakatau, Smali/BakSmali)
- Supports multiple file formats including Class, Jar, APK, DEX, WAR, JSP, and more
- Built-in Java compiler and advanced static search functionality
- Plugin and script engine support with a plugin console
- Malicious code scanning API integrated
- Multi-language support with dark mode and customizable UI
Installation
- Download the latest release from https://github.com/konloch/bytecode-viewer/releases
- Run the downloaded JAR file using the command: java -jar Bytecode-Viewer-2.10.x.jar
- Replace '2.10.x' with the current minor version number as needed
Usage
>_ -helpDisplays the help menu
>_ -cleanDeletes the BCV directory
>_ -englishForces English language translations
>_ -listDisplays the available decompilers
>_ -decompiler <decompiler>Selects the decompiler to use, default is Procyon
>_ -i <input file>Specifies the input file (Jar, Class, APK, ZIP, DEX supported automatically)
>_ -o <output file>Specifies the output file (Java source or Java bytecode)
>_ -t <target classname>Specifies the fully qualified classname to decompile or 'all' to decompile all as zip
>_ -nowaitDoes not wait for user input before closing CLI messages
- Integrate Bytecode Viewer with automated malware sandbox environments to enhance static analysis capabilities.
- Use the plugin and scripting engine to develop custom detection rules for identifying obfuscated or malicious Java/Android code.
- Leverage multi-decompiler support to cross-verify suspicious code segments and improve reverse engineering accuracy.
- Incorporate Bytecode Viewer into red team toolkits for rapid exploit development and payload customization targeting Java-based applications.
- Deploy as part of purple team exercises to bridge gaps between offensive code analysis and defensive signature creation.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about bytecode-viewer. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
3 free chats per tool • Instant responses • No credit card
Related Tools
PayloadsAllTheThings
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF

hoppscotch
hoppscotch/hoppscotch
Open source API development ecosystem - https://hoppscotch.io (open-source alternative to Postman, Insomnia)
ImHex
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

termux-app
termux/termux-app
Termux - a terminal emulator application for Android OS extendible by variety of packages.

sentry
getsentry/sentry
Developer-first error tracking and performance monitoring
CheatSheetSeries
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
