Sylvain's Blog
  • Home
  • Blog
  • C#
  • Reverse Engineering
  • Security
  • Virtualization
  • Visual Basic
Select Page

VBReFormer: How to alter a Visual Basic 6.0 application

by sbruyere | May 22, 2010 | Reverse Engineering, Security, Visual Basic

One of the most exiting feature of VBReFormer is design edition mode for binaries Visual Basic applications. I have done this webcast to show that we can easily edit and alter an executable written with Visual Basic 6 with help of my half-decompiler VBReFormer 2007...

Recent Posts

  • VBReFormer 6.4 Released with support of for/next and array-related statements decompilation
  • VBCompTester discontinued: Use VBReFormer Free Edition instead
  • VBReFormer 6.2 Released with support of Unicode System & +11000 Win32 APIs
  • New website: Decompiler-VB.Net V3.0 Launch !
  • The truth about P-Code

Recent Comments

  1. Apuromafo on VBReFormer: CrackMe Sample #1
  2. Peter Derföldi on C#: How to add some SortField to a CrystalReportViewer by using reflection

Archives

  • April 2017
  • January 2015
  • June 2014
  • October 2013
  • May 2011
  • April 2011
  • January 2011
  • May 2010
  • November 2009
  • May 2008

Categories

  • C#
  • Non classé
  • Reverse Engineering
  • Security
  • Virtualization
  • Visual Basic
  • Facebook
  • Twitter
  • Instagram
  • RSS

Designed by Elegant Themes | Powered by WordPress