Enterprise Scale

PuTTY SSH Client — 191,000 Lines

One of the most widely-deployed SSH clients in the world. We decompiled the binary, extracted 2,645 functions, mapped 1,921 dependency edges, and produced a complete architecture—navigable, searchable, ready for security review.

2,645
Functions
1,921
Dependencies
191K
Lines
<1hr
Total Time

Architecture Map

The full call graph of PuTTY, extracted from a compiled binary. Every function, every dependency, every call chain. At this scale, manual analysis would take weeks. The pipeline finished in under an hour.

PuTTY SSH Client — RippleForge Architecture Map
▶ Click to explore interactive map
RippleForge architecture visualization — 514 of 2,645 total nodes shown. The full project graph with all functions and 1,921 dependency edges lives in the RippleForge project file. Click the map to pan, zoom, and search the interactive version.

Why Scale Matters

Most reverse engineering tools work on small examples. Real systems are not small.

191,831
Lines of Code
The full decompiled output. Cryptographic protocols, terminal emulation, SSH key exchange, session management—all mapped.
12
Call Depth
Deepest call chain in the graph. The pipeline traces every path, identifies hotspots, and surfaces critical dependencies.
47
Max Callers
The most-called function has 47 callers. These hotspots are where risk concentrates—and where changes have the most impact.

What This Demonstrates

This is not a prototype. This is the same pipeline, the same tools, applied to a codebase 27x larger than the COBOL banking demo.

Got a system at this scale?

Millions of lines. Decades of accumulated changes. No one who remembers how it works. That is exactly what we do.

Talk to an Engineer