references:
- https://reverseengineering.stackexchange.com/questions/1597/reverse-engineering-a-visual-basic-p-code-binary
- http://web.archive.org/web/20071020232030/http://www.alex-ionescu.com/vb.pdf (ref: Alex Ionescu)
- http://web.archive.org/web/20101127044116/http://vb-decompiler.com/pcode/opcodes.php?t=1
- https://github.com/bontchev/pcodedmp
- http://www.openrce.org/blog/view/1719/Visual_Basic_6_IDC_updated
- https://pediy.com/thread-12832.htm
- https://github.com/vic4key/VB-Exe-Parser/blob/master/VB-Parser.py
- http://www.openrce.org/repositories/users/Paolo/vbpython.py
- https://www.virusbulletin.com/uploads/pdf/magazine/2002/200201.pdf
- https://web.archive.org/web/20151222171103/http://www.woodmann.com/crackz/Tutorials/Vbpcode.htm
- https://github.com/VBGAMER45/Semi-VB-Decompiler
- http://www.dotfix.net/doc/reversing_pcode.htm
- http://sandsprite.com/vb-reversing/vbdecompiler.chm
- http://sandsprite.com/vb-reversing/vb-decompiler/
Here are a couple more resources to add to your reading/viewing list.