Extract „compiled“ Autoit-Scripts from PE executables

With „strings“ we can examine the PE executable and gather information about it – in a case the executable has been compiled with Autoit we see something similar like this.

To extract the information we can use AutoIt-Ripper with the command C:\Python310\Scripts\autoit-ripper.exe executable.exe c:\Users\t0fu\Desktop.

Schreibe einen Kommentar

Your email address will not be published. Required fields are marked *.

*
*
You may use these <abbr title="HyperText Markup Language">HTML</abbr> tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>