Analyze .class files and JARs - View JVM instructions, detect obfuscation, find security issues
View all JVM instructions in each method with syntax highlighting. See opcodes, operands, and stack effects.
Each bytecode instruction comes with a human-readable explanation of what it does.
Detects calls to dangerous APIs like Runtime.exec(), reflection, deserialization, and network operations.
Identifies signs of code obfuscation including short/random names, unusual patterns, and synthetic members.
Visualize class dependencies to understand code structure and external library usage.
Analyze entire JAR files with summary statistics, class listings, and aggregated security analysis.
Encode, decode, measure sizes, and transform common formats.