Based on our record, Ghidra seems to be a lot more popular than Resource Hacker. While we know about 64 links to Ghidra, we've tracked only 5 mentions of Resource Hacker. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
"Resource Hacker"[1] should be enough to edit some strings, you just need to find the right file. [1] http://angusj.com/resourcehacker/. - Source: Hacker News / 10 months ago
Btw there are a couple of small programs to extract icons from exe/dll -s I tried with (ResourceHacker)[http://angusj.com/resourcehacker/] and (BeCyIconGrabber)[https://jarlpenguin.github.io/BeCyIconGrabberPortable/] but neither could find other icons than the main icon AH I had the idea to maybe check the component dll-s and actually foo_ui_std.dll has the icons. Source: about 1 year ago
I do too but I’ve been using resource hacker for over a year or two now to quickly get the icon. Very rarely have I had to look elsewhere. Source: over 2 years ago
Right click into any script, then the resulting executable open it with Resource Hacker and you'll see what I'm talking about: the script is just as a resource of the .exe. Source: almost 3 years ago
You'll also need a program called Resource Hacker. Find it here: http://angusj.com/resourcehacker/. Source: almost 3 years ago
I've got no experience with reverse-engineering executables, but I got a bunch of code-like stuff showing up when I fed ULTIMA.EXE to Ghidra and told it to analyze it with all the flags set. Source: 11 months ago
The whole game is written in C++ (game logic intertwined with graphics). Ghidra can help you deconstruct the game binaries, but you need to put in a GREAT great effort to even get a starting point. Cheat Engine has been successful for some purposes, including an AI enabling utility for multiplayer (use with great care!). Source: 11 months ago
What I think you’re talking about is reverse engineering. It’s basically taking a program and analysing the compiled code to attempt to find out how it works. It’s a fairly expansive topic, and fairly tricky to do but look at anything to do with Ghidra to get started. Source: almost 1 year ago
Oh also just as an aside Ghidra is a really cool free tool developed by the NSA which can reverse engineer software by looking at its executable and recreating the C code from the instructions and static data within. It's another way to get familiarized with the relationship between C code and the instructions it compiles to. Source: about 1 year ago
There exist decompilers and other tools for helping make sense of assembly and that can automate some of the conversion back to higher level languages. In my brief involvement with Slippi I used Ghidra - a tool developed by the NSA, to do some of that kind of work, which I found a little amusing. Source: about 1 year ago
Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...
IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.
PE Explorer - EXE Editor, Resource Editor, Disassembler, Section Editor, Dependency Scanner, Quick Function Syntax Lookup. Analyze win32 executable files, including headers, procedures, and libraries. Edit icon resources and more.
OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.
Resource Tuner - Resource Editor: modify EXE file's resources, change Icons inside EXE, DLL, MUN. View, search, extract, replace, edit, add and delete the embedded resources of executable program files.
Binary Ninja - A reverse engineering platform and GUI