0

I have what seems to be a VC++ executable and would like to be able to use some of its methods in my own code, so far I've managed to find this article explaining how to use the code. However, I do not know the signature of the method I'm looking for, so I searched a bit more and found this SO posting that suggests the signatures are mangled.

So, is it possible to unmangle them? I mean, even if its by inspection, would it be possible? If so How do I extract the mangled method signatures?

Community
  • 1
  • 1
dorphalsig
  • 689
  • 1
  • 10
  • 27

1 Answers1

0

Reflecting or decompiling isn't reverse engineering, but you could use a decompiler like DotPeek to look at what you are dealing with. If the code is obfuscated, the originator does not want anything like this to occur.

flipdoubt
  • 13,897
  • 15
  • 64
  • 96
  • 1
    What I read is that the C++ mangles the signatures. I thought VC++ did not get MSIL code, and thusly you could not decompile it with the .net decompilers. – dorphalsig Jan 08 '14 at 17:05