How do I decompile a binary executable? I have the exe file and I want to see the code.>inb4 search for the code on githubthis is a proprietary software, they won't post the code publicly
are you retarded or pretending to be
>>107489900>ghidra
>>107489900i dont think you can, you just record and observe. lots of tools for doing that, you can open it with a binary hex editor and change the runtime, but thats it.
https://letmegooglethat.com/?q=how+to+decompile+a+binary+executable
>>107489900if you can figure it out im sure there will be many people interested
>>107489900Should be easy but you won't have any variable or function names unless they can be inferred OR are embedded somewhere in the exe or extracted from elsewhere.
>>107489917>i dont think you can decompile softwareHow new are you?How inexperienced?You're on the wrong board, 'hombre.
>>107489900>I want to see the code.its time we had a chat about what machine code is and how your journey on learning it is about to begin.
Just open it in Notepad, dummy.
>>107489900Rename the .exe file to .zip and extract it
>>107489900Well you need to decompile and reclass it while guessing what each individual function is supposed to mean on a semantical level. It's a long and tedious work.
>>107490018True, tho AI can help with naming.
>>107489900You pirate IDA Pro and run it on your program. Some problems you're going to run into though: 1. Comments cannot be reconstructed2. Variable names cannot be reconstructed. Sometimes function names as well if the symbols were stripped.Basically, decompiled source code will never look like the original source code.
>>107489900It depends how it was made, so figure that out first. If it's written in C# then there are dedicated tools for that, same goes for video games made with popular engines. It might be a Java or Python program that's been packaged into a self-extracting EXE. They might have accidentally included debugging information which would make things much easier.Unfortunately, assuming it was written in C or C++ and was compiled in release mode with no debugging info, you're in for a lot of hard work. You can't really "see the code". What you can do is let a tool like Ghidra or IDA Pro generate code in a C-like language that roughly corresponds to what the binary is doing. You can then work through that code, making educated guesses at what it's for, renaming things and figuring out structures and classes. Sometimes the generated code will be misleading or wrong and you'll need to look at assembly instead.You'll need to be very comfortable with C, somewhat comfortable with assembly, and have a lot of general knowledge about how computer programs and operating systems work. Hopefully you have a CS degree or a comparable level of self-teaching. Ideally you should be an experienced software engineer in a similar domain to the thing you're trying to reverse, e.g. if it's a game it would really help if you've written a game at some point.
>>107489900Can you unbake a loaf of bread?
>>107490390Yes.
>>107489900Can you unshit a lump of excrement?(pajeets need not answer)
>>107490156>He doesn't just feed his decompiled code into an AI to generate the variable/function names
>>107490412Separate all the ingredients?Flour, sugar, salt. Yeast, water?No, you cant
>>107491135Yes, you can.
>>107491135>he doesn't know
>>107489900open it with binaryninja and then be prepared to read a fuck load of nonsense. Its a shame most reverse engineering tutorials are garbage its a interesting topic but any modern software decompiled is a mess to reverse engineer if you have zero experience.