-
Notifications
You must be signed in to change notification settings - Fork 1k
Is it possible to unpack a pkg compiled execute? #340
Comments
@ExtendLord |
@J05HI It depends You can decompile a .NET exe And also you can do the same to executes that were created by pkg. It is possible to view pkg(exe) files using a hex editor and you will be able to see the source code. |
@ExtendLord |
@J05HI If you go to a specific line, you will see the js code(Make sure that you use a hex editor that translate to letters :|) So the JS is still visible. You can try to search to get to that section(Where the JS code is). |
@ExtendLord |
@J05HI You need to find that line, it is different for each pkg(exe) You can do that by searching(Ctrl+F) For example search The code itself is somewhere around. |
@ExtendLord |
Only public package source is included in the binary. According to issue #194 you need to privatize your package manifest in order prevent your source from being included in the binary. AFAIK, private packages are stored as tokenized V8 compilations (no source, but stack-tracing is supported). For extra security maybe also include an obfuscator in your pre-build automation. A pirate would have to be very determined to reverse engineer tokenized obfuscation from a binary. Also encrypting any included content/media/assets is good practice. |
Duplicate of #328 |
No description provided.
The text was updated successfully, but these errors were encountered: