Enterprise Scale

PuTTY SSH Client — 191,000 Lines

One of the most widely-deployed SSH clients in the world. We decompiled the binary, extracted 2,645 functions, mapped 1,921 dependency edges, and produced a complete architecture—navigable, searchable, ready for security review.

2,645
Functions
1,921
Dependencies
191K
Lines
<1hr
Total Time

Architecture Map

The full call graph of PuTTY, extracted from a compiled binary. Every function, every dependency, every call chain. At this scale, manual analysis would take weeks. The pipeline finished in under an hour.

Interactive RippleForge visualization — pan, zoom, and search. 502 top-level nodes representing function clusters and modules. Full graph includes 2,645 functions and 1,921 call edges.

Why Scale Matters

Most reverse engineering tools work on small examples. Real systems are not small.

191,831
Lines of Code
The full decompiled output. Cryptographic protocols, terminal emulation, SSH key exchange, session management—all mapped.
12
Call Depth
Deepest call chain in the graph. The pipeline traces every path, identifies hotspots, and surfaces critical dependencies.
47
Max Callers
The most-called function has 47 callers. These hotspots are where risk concentrates—and where changes have the most impact.

What This Demonstrates

This is not a prototype. This is the same pipeline, the same tools, applied to a codebase 27x larger than the COBOL banking demo.

Got a system at this scale?

Millions of lines. Decades of accumulated changes. No one who remembers how it works. That is exactly what we do.

Talk to an Engineer