Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect dozens of binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface. Don't like what you get? Malcat is also heavily customizable and scriptable using python.
No Malcat videos yet. You could help us improve this page by suggesting one.
Based on our record, Resource Hacker should be more popular than Malcat. It has been mentiond 5 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
If the DLL exports at least one function (which should be the case), you can look in the ExportDirectory structure of the dll (using CFF explorer or malcat), there is a field at offset 0xC which is a RVA to the DLL's name. Source: about 2 years ago
Did you try https://malcat.fr ? The free edition seems to check all your boxes. Source: about 2 years ago
If you're into bin diffing, you can give malcat a try. Its diff algorithm is also based on Meyer's algorithm so it can realign, and its view modes let you compare structures as well as code or bytes. Diff mode is only available in paid version though, but the price is fair. Source: about 2 years ago
"Resource Hacker"[1] should be enough to edit some strings, you just need to find the right file. [1] http://angusj.com/resourcehacker/. - Source: Hacker News / 11 months ago
Btw there are a couple of small programs to extract icons from exe/dll -s I tried with (ResourceHacker)[http://angusj.com/resourcehacker/] and (BeCyIconGrabber)[https://jarlpenguin.github.io/BeCyIconGrabberPortable/] but neither could find other icons than the main icon AH I had the idea to maybe check the component dll-s and actually foo_ui_std.dll has the icons. Source: about 1 year ago
I do too but I’ve been using resource hacker for over a year or two now to quickly get the icon. Very rarely have I had to look elsewhere. Source: over 2 years ago
Right click into any script, then the resulting executable open it with Resource Hacker and you'll see what I'm talking about: the script is just as a resource of the .exe. Source: almost 3 years ago
You'll also need a program called Resource Hacker. Find it here: http://angusj.com/resourcehacker/. Source: almost 3 years ago
IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.
Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...
pestudio - pestudio is a tool allowing to statically analyze malicious files.
PE Explorer - EXE Editor, Resource Editor, Disassembler, Section Editor, Dependency Scanner, Quick Function Syntax Lookup. Analyze win32 executable files, including headers, procedures, and libraries. Edit icon resources and more.
PE-bear - PE-bear is a reversing tool for PE files.
Resource Tuner - Resource Editor: modify EXE file's resources, change Icons inside EXE, DLL, MUN. View, search, extract, replace, edit, add and delete the embedded resources of executable program files.