Do-download.com >Other >ResGrabber> Downloading

ResGrabber 1.0.0.0

Extract resources from .NET assembly or Windows executable module and .NET resource files

ResGrabber 1.0.0.0 free download ResGrabber 1.0.0.0 download will automatically start in 5 sec...
Click here if it does not          
ResGrabber Related Software
  • .NET Linker 4.80.12
    Assembly linking is an acute angle of any application including multiple assemblies
  • Spices.Net Decompiler 5.8.4.0
    .NET Decompiler - .Net assembly decompiler that recovers source code from crashes and convert executables to C#, Vb.Net, J#, Delphi.Net and managed C++ code.
  • Resource Tools 1.01.02
    Resource Tools - a set of command-line utilities for performing various operations over resources stored in PE32, PE32+ and RES files, and
  • Radialix 2.11.09
    Radialix 2 is an easy, technically elegant tool for binary localization of applications and resource files
  • .NET Obfuscator Professional 4.80.11
    .NET Obfuscator Professional is .NET code protection tool to secure .NET assemblies. Obfuscation significantly aggravates reverse engineering and reduces its effectiveness. Skater .NET Obfuscator is a comprehensive professional solution for .NET application code protection. Skater .Net Obfuscator prevents ILDASM/ILASM (MSIL disassembler and MSIL assembler) circuit clout technique. The breaking technique is based on injecting a piece of code into assembly that leads ILDASM to crash and inability to handle the assembly. Skater .NET Obfuscator reshuffles your .NET assemblies to the new build that is impossible to be understand, and unimaginable to decompile. Control Flow Obfuscation. This method alters source code so that it becomes logically harder to understand, while residing logically equivalent. During obfuscation a .NET assembly is converted into an equivalent .NET assembly that is more difficult to understand when decompiled. Some obfuscators use ILDASM to disassmble the assembly and then transform the original MSIL, and then use ILASM to reassemble the result. Wide variety of different techniques is applied to the assemblies to make the decompiled source code more difficult to understand String Encryption. String constants and literal strings in your .NET source code appear unmodified in your compiled .NET assemblies. At the obfuscation stage, they are encrypted and decryption routine is added into the assembly to be then called at runtime to return the original string values Main features of .NET Obfuscator Professional Prohibits reverse engineering Obfuscated application usually is not recompilable Processes any .NET application, executable or assembly Encrypts string constants Compatible with any .NET framework (1.0 through 4.0) Control flow obfuscation stops decompilers and deobfuscators Scrambles assembly entities names Provides .NET Licensing features Implements assemblies linkage; linker combines .NET assemblies into a single dll or exe