Start Your Free Trial


Decompile assembly code into C code, visualize the behavior of an application or firmware, collaborate with team members with Jupyter Notebooks by documenting findings and capturing them for re-use

Deep reverse engineering for binary.

Investigate binary applications and firmware for cyber vulnerabilities.

See a complete call graph, including functions called indirectly via pointers

Call Graphs

See any interactions among source files or within a whole binary executable

Whole Program Analysis

UML-based visualization of interactions between components


See which pointers point to which variables and procedures

Pointer Analysis

30-Day Trial



Use CodeSurfer on Your Code

Find out where you're vulnerable.

© GrammaTech. All rights reserved.

Try CodeSurfer On Your Code

30-Day Trial