![]() ![]() VB is sometimes used to write malware, for example, and by decompiling the executable you're able to get many more details on how it works. VB Decompiler Lite's opening interface is very straightforward. Forms expand to reveal controls, and you're able to browse modules and individual procedures.Ĭlick any of these in VB Decompiler Lite and you'll see a disassembly of the relevant code.Ĭlick the "Browse" button, choose your target executable, and wait a few seconds for the results to appear.Ī left-hand pane displays a tree of your project structure. Most of it won't mean very much, even to experts (it's all "mov eax, arg_8", "mov ecx, var_34", "mov, ecx" and so on), but the program helps out by expanding references to strings, functions and so on.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |