🌐
Hex-Rays
hex-rays.com
Hex-Rays: State-of-the-Art Binary Code Analysis Tools
Professional binary analysis with IDA Pro disassembler and decompiler. Tools for reverse engineering, malware analysis, and vulnerability research.
IDA Pro State-of-the-art, binary code analysis tool
Powerful disassembler, decompiler and versatile debugger in one tool. Unparalleled processor support. Analyze binaries in seconds for any platform.
Pricing
Choose the right IDA plan: Professional, hobbyist, student, or enterprise. Flexible decompiler options, cloud or local deployment, collaboration tools.
IDA Free Lightweight IDA at no cost to evaluate basic features
Free disassembler and decompiler to learn reverse engineering. Core IDA features at no cost for students and non-commercial use. Download and start today.
Decompilers Easily readable pseudocode to enhance your binary analysis
Transform complex machine code into readable C-like pseudocode. No more time-consuming assembly language learning. Make binary analysis straightforward.
🌐
LinkedIn
be.linkedin.com β€Ί company β€Ί hex-rays-sa
Hex-Rays | LinkedIn
Fully independent from any governmental agencies and stock market pressures, Hex-rays is renowned for developing the state-of-the-art binary software analysis solutions used for reverse-engineering, hostile code analysis and vulnerability research.
Discussions

ida - Are there any interactive decompilers besides HexRays? - Reverse Engineering Stack Exchange
Are there any decompilers that generate pseudo-code that is interactive? By interactive, I mean you can select a variable and rename it. Or you can select a function call and rename the function. O... More on reverseengineering.stackexchange.com
🌐 reverseengineering.stackexchange.com
July 19, 2016
Can people stop calling Hex-Rays a C/C++ decompiler?
🌐 r/RELounge
4
6
November 15, 2014
How good is the Hex Rays training? Or the new SANS 710?
You can check out Kaspersky Advanced Malware Analysis Course also. I've heard only good responses regarding it More on reddit.com
🌐 r/cybersecurity
2
2
March 29, 2022
Hex-rays is moving to a Subscription model
When reached for comments, the Ghidra community smirked quietly. More on reddit.com
🌐 r/ReverseEngineering
41
116
October 30, 2021
People also ask

Where is Hex-Rays's headquarters?
Hex-Rays is located in Bel, Antwerpen, Belgium.
🌐
crunchbase.com
crunchbase.com β€Ί organization β€Ί hex-rays
Hex-Rays - Crunchbase Company Profile & Funding
Who are Hex-Rays's competitors?
Alternatives and possible competitors to Hex-Rays may include rev.ng, Anvil Secure, And Boldend.
🌐
crunchbase.com
crunchbase.com β€Ί organization β€Ί hex-rays
Hex-Rays - Crunchbase Company Profile & Funding
🌐
GitHub
github.com β€Ί REhints β€Ί HexRaysCodeXplorer
GitHub - REhints/HexRaysCodeXplorer: Hex-Rays Decompiler plugin for better code navigation
Automatic type REconstruction for C++ objects. To be able to reconstruct a type using HexRaysCodeXplorer one needs to select the variable holding pointer to the instance of position independed code or to an object and by right-button mouse click ...
Starred by 2.6K users
Forked by 406 users
Languages Β  C++ 88.3% | C 7.6% | CMake 4.1%
🌐
Crunchbase
crunchbase.com β€Ί organization β€Ί hex-rays
Hex-Rays - Crunchbase Company Profile & Funding
Hex-Rays SA focuses on the development of robust binary analysis tools for the IT security market.
🌐
SecurityWeek
securityweek.com β€Ί home β€Ί news β€Ί ida pro owner hex-rays acquired by european vc firm
IDA Pro Owner Hex-Rays Acquired by European VC Firm - SecurityWeek
January 24, 2023 - European venture capital and private equity firm Smartfin has acquired Hex-Rays, the company behind the widely deployed IDA Pro software disassembler.
🌐
Caphyon
componentsource.com β€Ί brand β€Ί hex-rays
Hex-Rays - ComponentSource
March 31, 2021 - The Software Superstore for Developers and IT Professionals
🌐
Twitter
twitter.com β€Ί HexRaysSA
Twitter
JavaScript is not available Β· We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center Β· Help Center Β· Terms of Service Privacy Policy ...
Find elsewhere
🌐
GitHub
github.com β€Ί patois β€Ί HexraysToolbox
GitHub - patois/HexraysToolbox: Hexrays Toolbox - Find code patterns within the Hexrays ctree
HexRays Toolbox (hxtb) is a powerful set of IDAPython scripts that can be used to find and locate code patterns in binaries, independent from their underlying processor architecture.
Starred by 472 users
Forked by 46 users
Languages Β  Python
🌐
Wikipedia
en.wikipedia.org β€Ί wiki β€Ί Interactive_Disassembler
Interactive Disassembler - Wikipedia
November 14, 2025 - The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code. It supports a variety of executable formats for different processors and operating systems.
🌐
Hexblog
hexblog.com
Hex-Rays forum - User Control Panel - Login
Expert reverse engineering tutorials and IDA Pro tips. Weekly guides on binary analysis, malware research, decompiler techniques, and plugin development.
Top answer
1 of 6
9

Short answer: No, there is no other interactive decompiler, at least not for native codes.

Long answer: The Hex-Rays decompiler was created with the idea of interactiveness while all the other decompilers for native code that I know (I'm not talking about Java or .NET) were created as batch tools. The closest to a half interactive decompiler is Snowman, but is not really interactive (unless selecting which function you want to decompile when using the IDA Plugin is considered interactiveness.)

There is a toy "decompiler" (if the name is appropriate, as it's more a translator to pseudo-C than anything else) in Hopper but is neither interactive.

Boomerang, REC, and all the other abandoned decompiler projects that I know, were created either as command line batch tools or had a GUI just to let you select a binary.

So, as said at the beginning: the only interactive decompiler for native codes is the Hex-Rays one.

PS: I don't know why people is not focusing in the question instead of proposing their favourite tools... A disassembler is not an interactive decompiler.

2 of 6
1

The plasma project seems to have an interactive decompiler: https://github.com/joelpx/plasma

From the documentation:

$ plasma -i tests/server.bin
>> v main # or v 0xFFFFFF (replace 0xFFFFFF with the address of the function)
# You are now in visual mode. Press P to define the function. Then press TAB to decompile the function into pseudocode.
# You can hover over a variable using your arrows keys and press R to rename a variable. You can press X to see all xrefs to the variable.
🌐
Hex-Rays
hex-rays.com β€Ί products β€Ί decompiler
IDA Decompilers: Clear Pseudocode for Binary Analysis
November 27, 2019 - Transform complex machine code into readable C-like pseudocode. No more time-consuming assembly language learning. Make binary analysis straightforward.
🌐
Hex-Rays
hex-rays.com β€Ί products β€Ί ida
IDA Pro: Powerful Disassembler, Decompiler & Debugger
October 31, 2019 - Powerful disassembler, decompiler and versatile debugger in one tool. Unparalleled processor support. Analyze binaries in seconds for any platform.
🌐
Dsec
dsec.ru β€Ί presentations β€Ί hexrayspytools pdf
HexRaysPyTools
β€’ hexrays_tools by Milan Bohacek (Ida plugin contest winner in 2013) β€’ Interactive reconstruction (but no help in understanding) β€’ Lots of information can be retrieved before creating type. β€’ Helps to visit virtual functions Β· β€’ Virtual table detection.
🌐
Reddit
reddit.com β€Ί r/relounge β€Ί can people stop calling hex-rays a c/c++ decompiler?
r/RELounge on Reddit: Can people stop calling Hex-Rays a C/C++ decompiler?
November 15, 2014 -

When I was trying to decompile a C++ program, I looked a lot about it, and saw lots of suggestions about "Hex-Rays C/C++" compiler, including on the ReverseEngineering subreddit.

The thing is: Hex-Rays is NOT, ABSOLUTELY NOT capable of understanding C++, at all.

Reverse Engineering C++ in first place is not easy, still tools for that exist, the thing is that Hex-Rays don't provide basic tools to work with C++, it supports structs, enums and unions, it doesn't understand even C emulation of C++ concepts, neither has tools to help it.

For example: The program I am decompiling, has some extremely long inheritance chains of classes, meaning that the "end" class you are working with, might have lots of different possible v-tables.

The plugin "hexrayscodeexplorer" help a bit, specially with its automatic v-table struct creation, still it is a bit problematic, specially when you might end with 30 vtable structs bloating your database, for each class.

So please, be clear about it: Hex-Rays is a C decompiler, not C++, it can help a bit in understanding C++ code, but it is NOT a C++ decompiler.

Other unsupported C++ features: Hex-Rays (and IDA itself) struggle with STL, even the STL names themselves make IDA barf, either because of the length (that also break sigmaker.exe), or the use of characters that are unsupported by IDA in identifiers(< > , etc... also I am aware you can manually allow those in the .cfg, but the editor cursor highlight then start to misbehave)

Hex-Rays don't come with any native RTTI tools beside Borland (and why it DOES have Borland tools native, and not the others?).

There is no easy way that I found, to organize class hierarchies beside making notes by yourself outside of Hex-Rays.

Hex-Rays (and IDA) provide no clear way to support polymorphism in a organized manner, even in functions, if you have 20 variations of a single function, you must come up with 20 unique names for it... I eventually realized the most easy way to work with this is abuse IDA C++ name demangler: ie: generate a mangled name of the function, and put it in IDA, that will automatically demangle it back for display, this way instead of naming it function, function1, function2, function3, or something silly like that, you can use 3 mangled names, that will render as function() in the function list.

there are many other issues, but people are nagging me here and not letting me write, so my post ends here, but my point is: at least with its current features, Hex-Rays is NOT a C++ decompiler, only a pure C one.