A free and open source editor for CSound
with Python and Lua support.

About

WinXound is a free and open source Front-End GUI Editor for CSound, CSoundAV, CSoundAC, with Python and Lua support, developed by Stefano Bonetti. It runs on Microsoft Windows, Apple OsX and Linux.


WinXound Features:
  • Edit CSound, Python and Lua files (csd, orc, sco, py, lua) with Syntax Highlight and Rectangular selection;
  • Run CSound, CSoundAV, CSoundAC, Python and Lua compilers;
  • Run external language tools (QuteCsound, Idle, or other GUI Editors);
  • CSound analysis user friendly GUI;
  • Integrated CSound manual help;
  • Possibilities to set personal colors for the syntax highlighter;
  • Convert orc/sco to csd or csd to orc/sco;
  • Split code into two view horizontally or vertically;
  • CSound csd explorer (File structure for Tags and Instruments);
  • CSound Opcodes autocompletion menu;
  • Line numbers;
  • Text-area rectangular selection;
  • Bookmarks;
...and much more ... (Download it!)

The ARSC decompiler is a command-line tool that takes compiled Android resource files ( .arsc ) as input and generates human-readable source code. The tool is designed to work with Android's resource compiler, which converts resource files into a compact binary format. By decompiling these resources, developers can gain insights into an app's internal structure, identify potential security vulnerabilities, and even recover lost or obfuscated code.

Here's an example command to decompile an .arsc file:

The ARSC decompiler, also known as the Android Resources Compiler Decompiler, is a powerful tool used to reverse-engineer and decompile Android app resources. It is a crucial utility for developers, researchers, and security experts who need to analyze and understand the internal workings of Android applications.

The ARSC decompiler is a powerful tool for analyzing and understanding Android app resources. Its ability to decompile .arsc files and generate human-readable source code makes it an essential utility for developers, researchers, and security experts. Whether you're reverse-engineering an app, analyzing security vulnerabilities, or debugging your own app, the ARSC decompiler is a valuable resource to have in your toolkit.

arsc-decompiler -i input.apk -o output_directory This command decompiles the .arsc file contained within the input.apk file and saves the output to the output_directory .

DOWNLOADS

WINDOWS

WinXound 3.4.1 - Binary (29/03/2015 - 1021K)
WinXound 3.4.1 - Sources (29/03/2015 - 5463K)


OSX

WinXound 3.4.0 - Binary (03/11/2012 - 1598K)
WinXound 3.4.0 - Sources - Xcode 4.5.0 (03/11/2012 - 1927K)


LINUX

WinXound 3.4.0 - Binary 32 bit(23/07/2013 - 2613K)
WinXound 3.4.0 - Sources (23/07/2013 - 3121K)



NOTE

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Decompiler Exclusive - Arsc

The ARSC decompiler is a command-line tool that takes compiled Android resource files ( .arsc ) as input and generates human-readable source code. The tool is designed to work with Android's resource compiler, which converts resource files into a compact binary format. By decompiling these resources, developers can gain insights into an app's internal structure, identify potential security vulnerabilities, and even recover lost or obfuscated code.

Here's an example command to decompile an .arsc file:

The ARSC decompiler, also known as the Android Resources Compiler Decompiler, is a powerful tool used to reverse-engineer and decompile Android app resources. It is a crucial utility for developers, researchers, and security experts who need to analyze and understand the internal workings of Android applications.

The ARSC decompiler is a powerful tool for analyzing and understanding Android app resources. Its ability to decompile .arsc files and generate human-readable source code makes it an essential utility for developers, researchers, and security experts. Whether you're reverse-engineering an app, analyzing security vulnerabilities, or debugging your own app, the ARSC decompiler is a valuable resource to have in your toolkit.

arsc-decompiler -i input.apk -o output_directory This command decompiles the .arsc file contained within the input.apk file and saves the output to the output_directory .

CONTACT

WinXound Developer

  

CSound Home Page

  https://csound.com/

CSound Download Page

  csound.com/download

INFO

Source Code arsc decompiler

  • Windows: The source code is written in C# using Microsoft Visual Studio C# Express Edition 2008
  • OsX: The source code is written in Cocoa and Objective-C using XCode 3.2 version
  • Linux: The source code is written in C++ (Gtkmm) using Anjuta
  • For the OsX-Cocoa version of WinXound special thanks go to Giuseppe Silvi for the debugging help and other useful suggestions.
    The TextEditor is entirely based on the wonderful SCINTILLA text control by Neil Hodgson (http://www.scintilla.org).


Credits
Many thanks for suggestions and debugging help to Roberto Doati, Gabriel Maldonado, Mark Jamerson, Andreas Bergsland, Oeyvind Brandtsegg, Francesco Biasiol, Giorgio Klauer, Paolo Girol, Francesco Porta, Eric Dexter, Menno Knevel, Joseph Alford, Panos Katergiathis, James Mobberley, Fabio Macelloni, Giuseppe Silvi, Maurizio Goina, Andrés Cabrera, Peiman Khosravi, Rory Walsh, Luis Jure and Giovanni Doro. The ARSC decompiler is a command-line tool that