![image2icon windows image2icon windows](http://img.over-blog-kiwi.com/1/43/54/07/20150930/ob_f55441_demo1.jpg)
The second one, highlighted in yellow is function size. With purple color, at the window title, there is total number of filtered function (equals to 43). I eventually realised that each Icon Mode corresponds to each of the method/function in here.Ībove, I highlighted two things. Typing lock showed me there some interesting functions in the executable.Īfter retyping, 48 methods named isLocked showed up. In here, I searched for few occurence of the words which would yield interesting results. I use Sketch.App for all my image editings.Īfter loading the application in Ghidra, I imidietly went for Functions window. This means we can't crack application logic and create keygen. The Lock Icon represents the mode which are not available for free.Īlso, there is no offline installation, nor key-based activation. In short, here is the example of the end results:Īs you can see from above picture, basically all Sick modes in the application are disabled which means there are just a couple of them possible ( use-for-free). The application is rather cheap (10$), and you can buy it here which I highly recommend for the simplicity of use and the pricetag. This simple yet cool application allows you to change Folder Icons to look Sick! The application has been developed by the same company who created a famous Bear.App ( a note taking ecosystem app).
#Image2icon windows how to
In this post, we will learn how to use Ghidra Scripting to patch a MacOS application called Image2Icon. To be honest, I'm still learning Ghidra potential but from what I can see, the possibilities are endless. As someone who pretty much enjoy reading low-level code, I really dig what NSA did with this framework. Have you ever wondered how cool Ghidra is? I did for almost since the release. Image2icon.app macos osx reverseengineering ghidra scripting night