Decompiler Installshield Download

 Posted admin
Decompiler Installshield Download Rating: 4,6/5 7149 reviews
Hi All,
Does anyone know of any way to decrypt/decompile an installer?
I built an installer with Installshield. By accident, I deleted all the source for the installer. Not sure if there's any tool that could reverse back the whole directory?
I can unzip the Data1.cab file, but I could only get to some of the files, and some are still encrypted. Plus I lost all the custom actions.
I still need to reuse the installer files and structure for future installer.
So I don't have to build everything again. I don't need source code, because I have that backed up, but I want all the dll, exe, custom actions, windows components (with the right version), also the structure of the ism file.
Any suggestions? Thanks in advance!!
-->

Orca.exe is a database table editor for creating and editing Windows Installer packages and merge modules. The tool provides a graphical interface for validation, highlighting the particular entries where validation errors or warnings occur.

This tool is only available in the Windows SDK Components for Windows Installer Developers. It is provided as an Orca.msi file. After installing the Windows SDK Components for Windows Installer Developers, double click Orca.msi to install the Orca.exe file.

Syntax

orca[][]

Command Line Options

Orca.exe uses the following case-insensitive command line options. A slash delimiter may also be used in place of a dash.

OptionDescription
-qQuiet mode
-s<database> Schema database ['orca.dat' - default]
-?Help dialog

Orca.exe uses the following case-insensitive command line options with merge modules. A slash delimiter may also be used in place of a dash. When performing a merge the -f, -m and <sourcefile> are all required.

OptionDescription
-cCommit merge to database if no errors.
-!Commit merge to a database even if there are errors.
-m<module> Merge Module to merge into database.
-fFeature[:Feature2] Feature(s) to connect to Merge Module.
-r<directory id> Directory entry for the module root redirection.
-x<directory> Extract files to an image under the directory.
-g<language> Language used to open a module.
-l<log file> File to use as a log, append if it already exists.
-i<directory> Extract files to the source image under the directory.
-cab<filename> Extract the MSM cabinet to file.
-lfnUse Long File Names during the extraction.
-configure<filename> Configure the module using data from a file.

Related topics