How To Modify .Exe Files Or A Software HIjacking.
Hey, Hackerz Here's our new post on Software Hijacking or somewhat exactly meant as Reverse Engineering the Compiled .exe, .dll, .sys, .msstyles, .cpl, .ocx, .acm, .ax, .dpl, .bpl, .mui, .scr files. Here are few sets of programs which can be used for reverse engineering the particular executable programs.
1. PE Explorer
PE Explorer hosts too many tools to show them all on one page, so we took only few screenshots to give you an idea of how it looks like. Take the PE Explorer Feature Tour to learn more.
Export, Import, Delay Import Viewers
The Export, Import and Delay Import Table viewers allow you to view all the external functions the executable is using, and the results are categorized based on the DLL or library which contains them. A very useful feature here is the Syntax Viewer, which displays the calling syntax for functions it knows about and allows you to expand the syntax database with your own definitions.
The Resource Editor offers a thorough look at all of the resources (bitmaps, jpeg, png, icons, strings, etc) in the file, and allows you to make modifications without needing to recompile the source code.
Restoring the original values of sections' offsets to real data in the file is not an easy task. In many respects it depends on intuition and supposition, and is practically impossible to completely automate the given process. The Section Editor allows you to facilitate a solution to these problems.
PE Explorer Disassembler utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary win32 PE files (EXE, DLL, OCX) with the highest degree of accuracy possible.
Dependency Scanner displays a list of all the external DLLs the selected PE file depends on, and iteratively scans each of these files for its dependencies. The Dependency Scanner opens a second window and displays the dependencies on the left in a hierarchy, with version information on each of these files displayed in the right-hand pane as you click on them.
2. Resource Hacker
1. View resources in Win32 executable files
(*.exe, *.dll, *.cpl, *.ocx) and in Win32
resource files (*.res) in both their compiled
and decompiled formats.
2. Extract (save) resources to file in:
*.res format; as a binary; or as decompiled
resource scripts or images.
Icons, bitmaps, cursors, menus, dialogs,
string tables, message tables, accelerators,
Borland forms and version info resources can
be fully decompiled into their respective
formats, whether as image files or *.rc text
3. Modify (rename or replace) resources in
executables. Image resources (icons, cursors
and bitmaps) can be replaced with an image from
a corresponding image file (*.ico, *.cur, *.bmp),
a *.res file or even another *.exe file.
Dialogs, menus, stringtables, accelerators and
messagetable resource scripts (and also Borland
forms) can be edited and recompiled using the
internal resource script editor.
Resources can also be replaced with resources
from a *.res file as long as the replacement
resource is of the same type and has the same
4. Add new resources to executables.
Enable a program to support multiple languages,
or add a custom icon or bitmap (company logo
etc) to a program's dialog.
5. Delete resources.
Most compilers add resources into applications
which are never used by the application.
Removing these unused resources can reduce an
3. APK EDITOR (RE For Android)
APK Icon Editor is the free tool designed to easily edit and replace APK (Android Package) icons. Written in C++ and Qt framework.
Edit, replace and extract APK icons;
Edit application name, version and resources;
Sign and optimize APKs;
Supported image formats:
PNG, ICO, GIF, JPG, BMP;
Size presets for Android, BlackBerry and Amazon Kindle Fire devices;
Cloud storage upload: Dropbox, Google Drive, Microsoft OneDrive;
Multilingual extensible interface.