in reply to Reverse PP Packaging

You can use zip or 7-zip to unpack the executable. 7-zip, at least, seems to be able to unpack any executable. It can be interesting to see what's "hiding" in an executable.

Replies are listed 'Best First'.
Re^2: Reverse PP Packaging
by Discipulus (Canon) on Sep 04, 2014 at 07:39 UTC
    is interesting..but not surprising: i tried with a packed version of my tk Tartaglia's triangle and with 7-zip you can see all the files and modules inserted in it. If i remember correctly i had a problem with the absence of libwinpthread-1.dll so i put it in the executable in this way: copied in the same dir of pp, and told pp to add (--add) ./libwinpthread-1.dll. So in the verbose output i found: pp: ... adding ./libwinpthread-1.dll as ./libwinpthread-1.dll
    c>ls -l Tartaglia.v35.exe -rwxrwxrwx 1 user group 11112739 Jun 19 11:26 Tartaglia.v35.e +xe c>ls -lr 7zip-tartataglia-exe total 82 drwxrwxrwx 1 user group 0 Sep 4 09:15 script -rw-rw-rw- 1 user group 48640 Apr 5 19:15 libwinpthread-1 +.dll drwxrwxrwx 1 user group 0 Sep 4 09:15 lib -rw-rw-rw- 1 user group 224 Jun 19 11:26 META.yml -rw-rw-rw- 1 user group 32814 Jun 19 11:26 MANIFEST c>ls -lr 7zip-tartataglia-exe\script total 54 -rw-rw-rw- 1 user group 53331 Jun 19 11:26 tk-tartaglia35. +pl -rw-rw-rw- 1 user group 704 Jun 19 11:26 main.pl c>
    HtH
    L*
    There are no rules, there are no thumbs..
    Reinvent the wheel, then learn The Wheel; may be one day you reinvent one of THE WHEELS.