![]() From: 'You can extract your MSI package to a local folder and then run.Net Reflector to decompile binaries you are interested. If you have any feedback, please tell us. Hope this helps! If I misunderstood, please feel free to let me know.īest regards, Yichun Chen Please remember to mark the replies as answers if they help and unmark them if they provide no help. We can check the information of files and registry keys that will be added or installed. It is generally applied in the scenario that we need to edit the existing Windows Installer package (.msi) files directly. If you want to check any MSI file, is a table-editing tool available in the Windows Installer SDK and it can be used to edit your.msi files. I'm not quite sure what you mean 'decompile disassemble an msi file'. To try out Kemps advice here's a site that sells unobfuscated*.Net code: * It was unfuscated a couple of years ago HTH Jeremy - MCP| MCAD.Net| MCSD.Net. For that sort of stuff you'll have to adventure into reverse engineering with IDA Pro, OllyDbg & etc. FYI: Many installers aren't.Net code and you wont be able to use reflector in a lot of these cases, for example you cant decompile an installer made from Nullsofts' NSIS in Reflector. In addition to Kemp Browns answer, if you wish to see what RegKeys and Files are Created during an installation run Process Monitor while installing. See what is it exactly installing and which registry keys are modified or created? That's one reason software authors use obfuscators - to prevent others from reverse-engineering their code and to protect their intellectual property. ![]() To extract files from MSI, see To decompile managed binaries, get.Net reflector from ' If someone ran an obfuscator (such as ) on the code, though, all bets are off. A simple google search would have gave you these information.įrom: 'You can extract your MSI package to a local folder and then run.Net Reflector to decompile binaries you are interested. As a general note to software developers, you should use a plugin like DCryptDll if you need to protect certain files in your installer. A decompression plug-in is also available for TotalCommander. ![]() Supports decompressing NSIS installers compressed with lzma or bzip, but the source code is still partially compiled and requires extensive modification before the script can be recompiled. There are, however, external tools that allow this. It is the developer's choice whether the source code and/or the files for the installer are available to the public or not. The installer itself doesn't provide any method to extract files or the script without installation. Thaman667 25th January 2013 08:44 UTC Currently NSIS installers cannot be fully decompiled. Fix Windows Errors and Optimize PCFix Windows Errors Optimize Your System No Blue Screen, No. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |