Skip to content

struppigel/Exe4jConfigExtractor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 

Repository files navigation

EXE4J Configuration Extractor

This script helps reverse engineering Portable Executable files created with EXE4J by extracting their configuration data. Especially if EXE4J was used to not wrap a JAR file but only to launch it, the configuration is all you can get from such a file.

Since install4j also uses EXE4j, it works on those executables too.

example output

Preparation

Install the required dependencies

pip install tabulate pefile

Usage

Execute the script on a sample

python exe4j_config_extractor.py <sample-path>

Embedded JARs

This script does not extract embedded JARs, it only finds their offsets. Use 7zip on the file to unpack embedded .JAR files. Alternatively, execute the file and grab the JAR from the TEMP folder. It is named e4j_xxxx.tmp

About

Configuration Extractor for EXE4J PE files

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages