🌐
Hex-Rays
hex-rays.com › decompiler
IDA Decompilers: Clear Pseudocode for Binary Analysis
IDA Pro comes with the following plans, where the number of decompilers and their type (cloud-based or local) is the main denominator: - IDA Pro Essential comes with 2 on-line twin decompilers of your choice that run in the Hex-Rays cloud.
🌐
GitHub
github.com › REhints › HexRaysCodeXplorer
GitHub - REhints/HexRaysCodeXplorer: Hex-Rays Decompiler plugin for better code navigation
The CodeXplorer plugin is one of the first publicly available Hex-Rays Decompiler plugins. We keep updated this project since summer of 2013 and continue contributing new features frequently.
Starred by 2.6K users
Forked by 406 users
Languages   C++ 88.3% | C 7.6% | CMake 4.1%
🌐
YouTube
youtube.com › watch
Introduction to the Hex-Rays Decompiler SDK - YouTube
This is a high-level introduction to the Hex-Rays decompiler. We cover various fundamental concepts and the two supported representations: Microcode and Ctre...
Published   December 25, 2023
🌐
Hex-rays
hex-rays.co.il › hex-rays-decompiler
Hex-Rays Decompiler – Hex-Rays
This feature turns out to be much more useful with high level output. In this sample, I tried to trace how the retrieved function pointer is used by the function. In the disassembly output, many wrong eax occurrences are highlighted while the decompiler did exactly what I wanted.
🌐
Hex-Rays
hex-rays.com
Hex-Rays: State-of-the-Art Binary Code Analysis Tools
⚡️ Smarter decompilation · ⚡️ New Dynamic Xref Graph & Xref Tree · ⚡️ Expanded processor support · and more ... Release notes · Generate low-level assembly code from machine-executable code. Analyze binaries across 60+ processor architectures, including modern and legacy systems.
🌐
Hex-Rays
hex-rays.com › ida-pro
IDA Pro: Powerful Disassembler, Decompiler & Debugger
Collaborate online or offline with your teammates while analyzing the same binary. ... CentOS 7 x64 (x86_64) or later, Ubuntu 16.04 or later. Other equivalent distributions may work but not guaranteed. ... From 2 up to 11 decompilers of your choice between x86-32, x86-64, ARM-32, ARM-64, MIPS-32+nM, MIPS-64, PPC-32, PPC-64, ARC, RISC-V-32, RISC-V-32
🌐
Hex-Rays
hex-rays.com › ida-free
IDA Free: Disassembler & Decompiler at No Cost
Free disassembler and decompiler to learn reverse engineering. Core IDA features at no cost for students and non-commercial use. Download and start today.
🌐
E-SPIN Group
e-spincorp.com › hex-rays-decompiler-2
Hex-Rays Decompiler | E-SPIN Group
December 8, 2023 - The decompiler includes a configuration file, ‘hexrays.cfg,’ allowing users to customize aspects such as background colors, indentation, and line length.
Find elsewhere
🌐
GitHub
github.com › topics › hex-rays-decompiler
hex-rays-decompiler · GitHub Topics · GitHub
Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
🌐
Elastic
elastic.co › security-labs › introduction-to-hexrays-decompilation-internals
Introduction to Hex-Rays decompilation internals — Elastic Security Labs
The provided Python code serves as a mini recursive visitor of a CTree, note that it does not handle all node types, the last section will describe how to use the Hex-Rays built-in visitor class ctree_visitor_t. To begin, we obtain the cfunc of the function using ida_hexrays.decompile and access its CTree via the body field.
🌐
QBS Software
qbssoftware.com › home › vendors
Hex-Rays Decompiler
May 9, 2024 - Elevate your digital experience with our portfolio of Long Tail SaaS Technology Distributors, featuring seasoned pioneers and rising stars.
🌐
Hacker News
news.ycombinator.com › item
I've used Hex-Rays (IDA Pro's decompiler); not full-time, but 100+ hours, includ... | Hacker News
November 14, 2020 - First, let me say: Both are leaps and bounds above _anything_ else out there. Stuff like Hopper is basically just assembler code in a different syntax; Hex-Rays and Ghidra are real, working, useful decompilers. Hex-Rays charges four-figure sums for single licenses, and it's because the product ...
🌐
Hexrays
hexrays.net › files › productpage.html
Hexrays.net USA
The decompiler runs on MS Windows. Both the GUI and text IDA versions are supported; however, in the text mode, only batch operation is available. Facts about Hex-Rays Decompiler: • The decompiler supports 32-bit compiler-generated Intel x86 code • It can handle code generated by any mainstream ...
🌐
VA
oit.va.gov › Services › TRM › ToolPage.aspx
Hex-Rays Decompiler
Hex-Rays Interactive Disassembler (IDA) - Authorized w/ Constraints (DIVEST)
🌐
Hex-Rays
hex-rays.com › blog › igors-tip-of-the-week-40-decompiler-basics
Igor’s tip of the week #40: Decompiler basics – Hex Rays
June 18, 2024 - Full decompilation of the whole database can be requested via File > Produce file > Create C file… (hotkey Ctrl+F5).
Top answer
1 of 6
9

Short answer: No, there is no other interactive decompiler, at least not for native codes.

Long answer: The Hex-Rays decompiler was created with the idea of interactiveness while all the other decompilers for native code that I know (I'm not talking about Java or .NET) were created as batch tools. The closest to a half interactive decompiler is Snowman, but is not really interactive (unless selecting which function you want to decompile when using the IDA Plugin is considered interactiveness.)

There is a toy "decompiler" (if the name is appropriate, as it's more a translator to pseudo-C than anything else) in Hopper but is neither interactive.

Boomerang, REC, and all the other abandoned decompiler projects that I know, were created either as command line batch tools or had a GUI just to let you select a binary.

So, as said at the beginning: the only interactive decompiler for native codes is the Hex-Rays one.

PS: I don't know why people is not focusing in the question instead of proposing their favourite tools... A disassembler is not an interactive decompiler.

2 of 6
1

The plasma project seems to have an interactive decompiler: https://github.com/joelpx/plasma

From the documentation:

$ plasma -i tests/server.bin
>> v main # or v 0xFFFFFF (replace 0xFFFFFF with the address of the function)
# You are now in visual mode. Press P to define the function. Then press TAB to decompile the function into pseudocode.
# You can hover over a variable using your arrows keys and press R to rename a variable. You can press X to see all xrefs to the variable.