Re: Question: Extracting PKG Image Assets?
site_archiver@lists.apple.com Delivered-To: installer-dev@lists.apple.com Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=icloud.com; s=1a1hai; bh=QGYME7ywnQlJRt+Bv0k5nS4mdOJwoWyj+7GpDy8fjzE=; h=Content-Type:Mime-Version:Subject:From:Date:Message-Id:To:x-icloud-hme; b=y6cpSD4pwajFXcId75Yo7WTJ6vdRaGgzvmyl3GmG75QUIIDU663t/q8/JlvvGLi2C AIlkDL5Fvszck4eLix1Q/GQ/L4fgBPDsXACUl9sRA5WbhAoLiLvzJ1JdL+mcBn5e6I iKYuSdH15By2BQVdGMNdyKViJRl1HIGsS37eNUXIVWBKZrP8F4ASB/lTFxJUv6ff7S n/0LJFdlNpumhCm4rW7dH2oiFt4AkdnpcAX3ISShB8k3szl1chQVvNncoWJcPB7BOp Z1I4DVpXmHRchKsSTZta68qVooOx7PAgf13QxoTM2Od0p2+cnxINjZw7a3UIXLrWeC OZpjtQO1Ulu5g== The goal is not to look inside what’s contained within packages, but to extract the bitmaps/icons/dialogs used in the package installer itself (not the payload, but the package UI).
On Feb 18, 2025, at 14:31, Johan Landin <jol@ensys.se> wrote:
I sugget that you use "Suspicious Package” which can be downloaded from
https://www.mothersruin.com/software/SuspiciousPackage/
Best Regards /Johan Landin
On 18 Feb 2025, at 10:50, Sinan Karaca via Installer-dev <installer-dev@lists.apple.com> wrote:
Dear Developers,
How would I extract the assets contained in the PKG user interface itself (the wizard screens - blue dots, green checkmarks, etc.)?
Thanks, VB _______________________________________________ Do not post admin requests to the list. They will be ignored. Installer-dev mailing list (Installer-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/installer-dev/jol%40ensys.se
This email sent to jol@ensys.se
_______________________________________________ Do not post admin requests to the list. They will be ignored. Installer-dev mailing list (Installer-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/installer-dev/site_archiver%40lists.... This email sent to site_archiver@lists.apple.com
participants (1)
-
Sinan Karaca via Installer-dev