ENNAENNA

Bytecode Viewer vs dex2jar

GitHub Stats

15.5k
Stars
13.1k
1.2k
Forks
2.2k
99
Issues
379
25d ago
Updated
1y ago
GPL-3.0
License
Apache-2.0
Java
Language
Java

About Bytecode Viewer

Bytecode Viewer is an advanced yet easy-to-use Java and Android reverse engineering suite. It combines six decompilers (Procyon, CFR, JD-GUI, Fernflower, Krakatau, JADX-Core), two disassemblers (Bytecode/Jasmin), and integrated tools like Hex Viewer, Smali/Baksmali, and DEX support into a single GUI application. Users can view the same class through multiple decompilers side-by-side to compare output quality. It supports JAR, CLASS, APK, DEX, and ZIP files. The plugin system allows extending functionality with custom analysis scripts. Essential for malware analysis and Android application reverse engineering.

About dex2jar

dex2jar is a set of tools for working with Android's DEX (Dalvik Executable) format and Java CLASS files. Its primary function is converting APK/DEX files to JAR format, enabling analysis with standard Java decompilation tools like JD-GUI or Procyon. The toolset includes d2j-dex2jar (DEX to JAR conversion), d2j-jar2dex (reverse conversion), d2j-smali/baksmali (assembler/disassembler), and d2j-decrypt-string (string decryption helper). It handles multi-DEX APKs and provides better conversion quality than alternatives for certain obfuscation patterns. A fundamental tool in the Android reverse engineering pipeline.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

Shared

androiddecompiler

Bytecode Viewer only

javareverse-engineeringapk-analysis

dex2jar only

dexdalvikapk-conversion