Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and directives. The tool performs static code analysis which means that you don't have to run your application in order to use it. How to use? macOS Go to the releases page . Download the latest *.dmg file. Install the application. Linux Go to the releases page . Download the latest *.AppImage file. Run the *.AppImage file (you may need to chmod +x *.AppImage ). Windows Go to the releases page . Download the latest *.exe file. Install the application. Creating a custom theme You can add your own theme by creating a [theme-name].theme.json file in Electron [userData]/themes . For a sample theme see Dark . Application Requirements Your application needs to be compatible with the Angular's AoT compiler (i.e. you should be able to compile it with ngc ). Using with Angular CLI Open the Angular's application directory. Make sure the dependencies are installed. Open ngrev . Click on Select Project and select [YOUR_CLI_APP]/src/tsconfig.app.json . Using with Angular Seed Open the Angular's application directory. Make sure the dependencies are installed. Open ngrev . Click on Select Project and select [YOUR_CLI_APP]/src/client/tsconfig.json . Demo Demo here . Download…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-12-08 16:04:002019-12-08 16:04:00Ngrev - Tool For Reverse Engineering Of Angular Applications
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com