Jump to content

Search the Community

Showing results for tags 'source code'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 20 results

  1. Paradise Ransomware source code released on a hacking forum The complete source code for the Paradise Ransomware has been released on a hacking forum allowing any would-be cyber criminal to develop their own customized ransomware operation. Released on the hacking forum XSS, the link to the source code is only accessible to active users on the site who have previously replied to or reacted to other posts on the site. Forum post with leaked Paradise Ransomware source code Security Joes researcher Tom Malka, who shared the source code with BleepingComputer, compiled the package and found it creates three executables - a ransomware configuration builder, the encryptor, and a decryptor. Source code for Paradise Ransomware Sprinkled throughout the source code are Russian comments, shown above, that clearly demonstrate the native language of the developer. A Paradise ransomware affiliate can use the builder to customize their own version of the ransomware to include a custom command and control server, encrypted file extension, and contact email address. Paradise Ransomware builder Once the customized ransomware is created, affiliates can distribute the malware in their campaigns to target victims. Welcome to Paradise The Paradise Ransomware operation first launched in September 2017 through phishing emails containing malicious IQY attachments that downloaded and installed the ransomware. Over time, multiple versions of the ransomware were released, with initial versions containing flaws that led to the release of a Paradise Ransomware decryptor. However, the new versions switched the encryption method to RSA, which prevented the free decryption of files. Michael Gillespie, who created the original Paradise Ransomware decryptor, told BleepingComputer that the versions of Paradise that were released include: Paradise - Native version that had the flaws allowing decryption. Paradise .NET - A secure .NET version that switched encryption algorithms to use RSA encryption. Paradise B29 - A "Team" variant that only encrypted the end of a file. Gillespie said that it is not clear if they were all developed by the same group as they were all circulating at around the same time with thousands of different extensions, as threat actors flocked to the growing Ransomware-as-a-Service. Based on submissions statistics to ID Ransomware, the Paradise Ransomware was heavily distributed between September 2017 and January 2020, when it suddenly tapered off until now, where it is rarely seen. Paradise Ransomware submissions to ID Ransomware Unfortunately, Gillespie tells BleepingComputer that the source code is for the secure version of Paradise Ransomware that utilizes RSA encryption to encrypt files. Using this source code, other threat actors can easily modify it to release their own customized version of the ransomware, allowing an easy entry point into creating a new ransomware operation. Paradise Ransomware source code released on a hacking forum
  2. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8. - Inno Setup-based installers. Changelog (4.4.1.132): Homepage: http://www.havysoft.cl/Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh
  3. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh Homepage: http://www.havysoft.cl/ Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8. - Inno Setup-based installers. Changelog:
  4. Someone attached a copy of the GitHub Enterprise Server source code to GitHub's DMCA section, but the GitHub CEO said they mistakenly leaked that code months ago. GitHub has denied rumors today of getting hacked after a mysterious entity shared what they claimed to be the source code of the GitHub.com and GitHub Enterprise portals. The "supposed" source code was leaked via a commit to GitHub's DMCA section. The commit was also faked to look like it originated from GitHub CEO Nat Friedman. But in a message posted on YCombinator's Hacker News portal, Friedman denied that it was him and that GitHub got hacked in any way. Friedman said the "leaked source code" didn't cover all of GitHub's code but only the GitHub Enterprise Server product. This is a version of GitHub Enterprise that companies can run on their own on-premise servers in case they need to store source code locally for security reasons but still want to benefit from GitHub Enterprise features. Friedman said this source code had already leaked months before due to its own error when GitHub engineers accidentally "shipped an un-stripped/obfuscated tarball of our GitHub Enterprise Server source code to some customers." Friedman promised that GitHub was going to fix the two bugs exploited by the leaker and prevent unauthorized parties from attaching their code to other people's projects via faked identities. "In summary: everything is fine, situation normal, the lark is on the wing, the snail is on the thorn, and all's right with the world," Friedman said. Not the first time But this is not the first time that this happened on GitHub. One of the two bugs was used just days earlier when a security researcher attached the source code of the youtube-dl library to GitHub's DMCA section. The security researcher's gesture came as a form of protest after GitHub decided to honor a suspicious DMCA takedown request against the youtube-dl library from music recording industry group RIAA. While the mystery leaker never explained their actions, it is believed that the person who leak the GitHub Enterprise Server code was also protesting against GitHub's decision to honor RIAA's DMCA request and take down youtube-dl, a project that lets users download raw audio and video files from YouTube and other services — which RIAA argued was heavily used to pirate its songs catalog. For the past week, hundreds of other users have been re-uploading the youtube-dl code on their own accounts and daring RIAA to send them a DMCA request too. GitHub has warned users not to do so, as they risk getting banned by its automated systems. Source
  5. FBI blames intrusions on improperly configured SonarQube source code management tools. The Federal Bureau of Investigation has sent out a security alert warning that threat actors are abusing misconfigured SonarQube applications to access and steal source code repositories from US government agencies and private businesses. Intrusions have taken place since at least April 2020, the FBI said in an alert sent out last month and made public this week on its website. The alert specifically warns owners of SonarQube, a web-based application that companies integrate into their software build chains to test source code and discover security flaws before rolling out code and applications into production environments. SonarQube apps are installed on web servers and connected to source code hosting systems like BitBucket, GitHub, or GitLab accounts, or Azure DevOps systems. But the FBI says that some companies have left these systems unprotected, running on their default configuration (on port 9000) with default admin credentials (admin/admin). FBI officials say that threat actors have abused these misconfigurations to access SonarQube instances, pivot to the connected source code repositories, and then access and steal proprietary or private/sensitive applications. Officials provided two examples of past incidents: "In August 2020, unknown threat actors leaked internal data from two organizations through a public lifecycle repository tool. The stolen data was sourced from SonarQube instances that used default port settings and admin credentials running on the affected organizations' networks. "This activity is similar toa previous data leak in July 2020, in which an identified cyber actor exfiltrated proprietary source code from enterprises throughpoorly secured SonarQube instances and published the exfiltrated source codeon a self-hosted public repository." Forgot problem resurfaces in 2020 The FBI alert touches on a little known issue among software developers and security researchers. While the cyber-security industry has often warned about the dangers of leaving MongoDB or Elasticsearch databases exposed online without passwords, SonarQube has slipped through the cracks. However, some security researchers have been warning about the dangers of leaving SonarQube applications exposed online with default credentials since as far back as May 2018. At the time, data breach hunter Bob Diachenko warned that about 30% to 40% of all the ~3,000 SonarQube instances available online at the time had no password or authentication mechanism enabled. This year, a Swiss security researcher named Till Kottmann has also raised the same issue of misconfigured SonarQube instances. Throughout the year, Kottmann has gathered source code from tens of tech companies in a public portal, and many of these came from SonarQube applications. "Most people seem to change absolutely none of the settings, which are actually properly explained in the setup guide from SonarQube," Kottmann told ZDNet. "I don't know the current number of exposed SonarQube instances, but I doubt it changed much. I would guess it's still far over 1,000 servers (that are indexed by Shodan) which are 'vulnerable' by either requiring no auth or leaving default creds," he said. To prevent leaks like these, the FBI alert lists a series of steps that companies can take to protect their SonarQube servers, starting with altering the app's default configuration and credentials and then using firewalls to prevent unauthorized access to the app from unauthorized users. Source
  6. Windows NT 3.5 and original Xbox source code leaks The source code for Microsoft's original Xbox gaming console and Windows NT 3.5 has leaked, as spotted by The Verge today. The report also confirms that the Xbox leak is authentic, including the Xbox Development Kit, emulators, internal documents, and the kernel. The kernel on the original Xbox console is based on Windows 2000, and the source code for that was leaked way back in 2004, something that Neowin exclusively reported on. Apparently though, this new leak was already being distributed among the enthusiast community for some time, which means that the source code leak isn't going to help in getting the kernel and Xbox OS up and running on emulators. According to the report, out of over 900 Xbox games, only about 40 of them have been able to run on emulators. And while Microsoft has its own emulation on Xbox One consoles, there are just over a dozen games supported for that. Sadly, it seems that at least for now, this leak doesn't mean that you can fire up your old Xbox games on newer hardware. Apparently, the Windows NT 3.5 source code is for a near-final build, and Microsoft wouldn't comment on it. You can go and look through the source code, although it's probably not as exciting as the original Xbox, since we've already seen source code leaks for both newer and older versions of Windows. Source: Windows NT 3.5 and original Xbox source code leaks (Neowin)
  7. Windows XP source code has allegedly leaked online Microsoft seems to have fallen victim to yet another leak regarding its Windows operating system. Specifically, the source code for Windows XP, as well as Windows Server 2003, has allegedly been shared online, as reported by BleepingComputer. Microsoft has been the target of numerous leaks of this kind in the past, with Windows 2000 being passed around all the way back in 2004, and more recently the Windows NT 3.5 source code also showed up online along with source code for the original Xbox. The full package shared today appears to include a few of these previous leaks, as well as MS-DOS 3.30, MS-DOS 6, Windows CE 3, 4, and 5, and more. Similar to what we've heard with previous leaks, these files have been passed around between hackers for years, but they're just now being shared more publicly. Aside from the compilation of source code for the aforementioned Windows versions, a package with just Windows XP and Windows Server 2003 source code has been shared in a separate file. Microsoft has yet to confirm whether the leaked data is legitimate. But if you're interested in the subject, combing through the files may be interesting, as this is a newer version of Windows than what we've seen leaked in the past. Windows XP source code has allegedly leaked online
  8. Bugs from Lodash and JQuery among the more commonly seen security problems GitLab, a rival to Microsoft's hosted git service GitHub, has for the second time tested the security of customers' hosted software projects... and found them wanting. The code storage and automation biz initially scanned hosted code for security issues in April. Having just just reprised its examination, the outfit has found there's still work that needs to be done to reduce software vulnerabilities. The biz's second security trends report shows a surge in projects that integrate vulnerable code libraries. "The percentage of projects finding issues with dependent libraries in use has significantly increased over the last year, from 26 per cent to 69 per cent," said Wayne Haber, engineering director, in the report. "This reinforces that updating dependent libraries should be prioritized based on the risks those libraries pose." The habit of creating apps with libraries that depend on still smaller libraries has made managing modern software security difficult, to say the least, since a bug in a common dependency can become a widespread problem across multiple projects. The issue is particularly bad in the Node.js ecosystem. As of August, the libraries with the most vulnerabilities (all distributed via npm) were: Lodash: Object prototype pollution Execa: OS command injection Mixin-deep: Prototype pollution Kind-of: Type checking Sockjs: Cross-site scripting Ajv: Improper input validation Minimist: Improper input validation Yargs-parser: Improper input validation JQuery: 3rd party CORS request may execute Dot-prop: Direct request forced browsing Both Lodash and JQuery tend to feature prominently in security reports as a source of vulnerabilities. It doesn't help that they're both widely used and have gone long periods without updates. Haber said the top three Common Weakness Enumerations (CWEs) – programming blunders that have the potential to lead to exploitable vulnerabilities – were: CWE-20: Improper input validation, which enables injection attacks. CWE-787: Out of bounds write of intended buffer, which enables remote code execution. CWE-400: Uncontrolled resource consumption, which enables denial of service attacks. There are a few bright spots, where "bright" means not getting worse or marginal improvement. The percentage of projects using containers with vulnerabilities, for example, has fallen from 52 per cent to 41 per cent. Also the percentage of projects with flaws found through static analysis has remained basically flat (from 49 per cent to 52 per cent). At the same time, the sorts of flaws identified via static analysis seem like they should have been dealt with long ago, like passwords exposed in URLs, improper permissions for files, predictable pseudorandom number generation, and lack of cipher integrity checking. If anything, GitLab's report shows that there's always going to be work for computer security professionals. Source
  9. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  10. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  11. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh Homepage: http://www.havysoft.cl/ Softpedia site: http://www.softpedia.com/get/Compression-tools/InnoExtractor.shtml Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  12. Description: InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Features: Simple and friendly GUI.Open installers into the application with only drag and drop executables from Windows Explorer.Explore the internal content (files and more) of the installer.Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable).Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only).Open internal files of the installer into the same application.Perform file searches by keyword.Input panel, that allows you to enter a valid password to extract encrypted installers.Properties panel to see advanced information about the installer.History for recently opened installer.Other miscellaneous options.Support older and latest versions of Inno Setup.Support older and latest versions of InnoUnp.Full Unicode support.Application available in multiple languages.Designed for Windows 2000, XP, Vista, 7 and 8.Much more!Changelog (4.4.0.909‏): Homepage: http://www.havysoft.clSoftpedia site: http://www.softpedia.com/get/Compression-tools/InnoExtractor.shtmlDownload up-to-date installer (clean / ads free installer version): http://www.mediafire.com/?xgkjwbwdtcis9sh
  13. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/3841ea2d Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  14. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/76ddda0a Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  15. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / toolbars free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/c472d0aa Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  16. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/e2d15645 Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  17. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/76ddda0a Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer. - Explore the internal content (files and more) of the installer. - Extract the embedded files and script to a local folder, to a zip package or to a self-extracting module (portable). - Decompiles the "CompiledCode.bin" file of the Installer to get the assembly code, corresponding to the "Code" script section (for advanced users only). - Open internal files of the installer into the same application. - Perform file searches by keyword. - Input panel, that allows you to enter a valid password to extract encrypted installers. - Properties panel to see advanced information about the installer. - History for recently opened installer. - Other miscellaneous options. - Support older and latest versions of Inno Setup. - Support older and latest versions of InnoUnp. - Full Unicode support. - Application available in multiple languages. - Much more! Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  18. "Extract data from any Inno Setup installer" InnoExtractor is a powerful tool that you can use to extract the internal files of Inno Setup installers. The application can be useful if you don't have administrative privileges to run a setup pack, for example. It does not have a wide range of features available, but InnoExtractor can be easily figured out, even by less skilled users. The app is wrapped in a user-friendly interface with an intuitive layout. You can load an executable file by using either the file browser or "drag and drop" method; its contents are automatically displayed in the main frame, and you can simply open a file, just like you normally would in Explorer. These files can be extracted to a user-defined location and format, whether we are talking about a local folder, ZIP archive or SFX module. Aside from locating a specific file, you can decrypt a password-protected Inno installer or view its properties (total files, size, compiler version, compression method, encryption status), disable the detection of embedded files, switch to a different language for the UI, as well as integrate InnoExtractor into the shell and empty the application cache. InnoExtractor is low-demanding concerning the CPU and system memory, and it has a good response time. We have not come across any issues throughout our evaluation; the app did not hang, crash or display error notifications. Thanks to its intuitive features, InnoExtractor pleases the entire audience who prefers a straightforward method to extract files from Inno setup packs. Screenshot: Download up-to-date installer (clean / toolbars free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/8fe3f6fb Homepage: http://www.havysoft.cl/Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  19. "Extract data from any Inno Setup installer" InnoExtractor is a powerful tool that you can use to extract the internal files of Inno Setup installers. The application can be useful if you don't have administrative privileges to run a setup pack, for example. It does not have a wide range of features available, but InnoExtractor can be easily figured out, even by less skilled users. The app is wrapped in a user-friendly interface with an intuitive layout. You can load an executable file by using either the file browser or "drag and drop" method; its contents are automatically displayed in the main frame, and you can simply open a file, just like you normally would in Explorer. These files can be extracted to a user-defined location and format, whether we are talking about a local folder, ZIP archive or SFX module. Aside from locating a specific file, you can decrypt a password-protected Inno installer or view its properties (total files, size, compiler version, compression method, encryption status), disable the detection of embedded files, switch to a different language for the UI, as well as integrate InnoExtractor into the shell and empty the application cache. InnoExtractor is low-demanding concerning the CPU and system memory, and it has a good response time. We have not come across any issues throughout our evaluation; the app did not hang, crash or display error notifications. Thanks to its intuitive features, InnoExtractor pleases the entire audience who prefers a straightforward method to extract files from Inno setup packs. Screenshot: Download up-to-date installer (clean / toolbars free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/b37d8671 Homepage: http://www.havysoft.cl/ Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
  20. "Extract data from any Inno Setup installer" InnoExtractor is a powerful tool that you can use to extract the internal files of Inno Setup installers. The application can be useful if you don't have administrative privileges to run a setup pack, for example. It does not have a wide range of features available, but InnoExtractor can be easily figured out, even by less skilled users. The app is wrapped in a user-friendly interface with an intuitive layout. You can load an executable file by using either the file browser or "drag and drop" method; its contents are automatically displayed in the main frame, and you can simply open a file, just like you normally would in Explorer. These files can be extracted to a user-defined location and format, whether we are talking about a local folder, ZIP archive or SFX module. Aside from locating a specific file, you can decrypt a password-protected Inno installer or view its properties (total files, size, compiler version, compression method, encryption status), disable the detection of embedded files, switch to a different language for the UI, as well as integrate InnoExtractor into the shell and empty the application cache. InnoExtractor is low-demanding concerning the CPU and system memory, and it has a good response time. We have not come across any issues throughout our evaluation; the app did not hang, crash or display error notifications. Thanks to its intuitive features, InnoExtractor pleases the entire audience who prefers a straightforward method to extract files from Inno setup packs. Screenshot: Download up-to-date installer (clean / toolbars free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/b2817317 Homepage: http://www.havysoft.cl/Requirements: - Windows 2000/XP/Vista/7/8/8.1. - Inno Setup-based installers. Changelog:
×
×
  • Create New...