For malware analysts dissecting Android trojans or students learning ARM assembly, these online tools are revolutionary. Just remember: with great decompilation power comes great responsibility. Never upload what you cannot afford to expose.
Modern malware uses OLLVM (Obfuscator-LLVM). This makes the control flow look like a bowl of spaghetti. Online decompilers will crash or produce gibberish. For obfuscated .so files, you need dynamic analysis (running the code), not static decompilation. libso decompiler online full
Use a local command if possible, or a quick Hex dump viewer online. You need to know if it's ARM (Android phones) or x86 (Linux servers). Dogbolt attempts to detect this automatically. For malware analysts dissecting Android trojans or students
For security researchers, malware analysts, and legacy application maintainers, peeking inside a .so file is often necessary. However, reading raw binary is impossible. This is where the need for a comes into play. Modern malware uses OLLVM (Obfuscator-LLVM)