netzob
pyinstxtractor
Our great sponsors
netzob | pyinstxtractor | |
---|---|---|
2 | 11 | |
741 | 2,332 | |
0.3% | - | |
0.0 | 5.5 | |
11 months ago | 2 months ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
netzob
-
Awesome Penetration Testing
Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols.
pyinstxtractor
-
Hack The Box - Vessel [Hard] - Walkthrough
I have used pyinstxtractor to extract the *.pyc files, and then the uncomplyle6 to decompile the *.pyc files. Which has led me to the actual source code of the binary:
-
How to reverse .EXE to .Py
Also, be real, you mention you use it once in the credits at the bottom of your readme while also advertising your mate's tool that ALSO looks like it uses identical code to the original, this time without even mentioning it. And given he also makes CS:GO cheat tools by the looks of it, I struggle to understand why any of you think you have the moral high ground in any of this...
Looks like your code is nothing more than a UI around the actual code that does the extracting no? Kinda massively overselling yourself my guy...
-
Synack Red Team Five CTF Writeup - Rev
It's a Pyinstaller binary.(I have used it once before, so I just knew it by checking the file.) Use https://github.com/extremecoders-re/pyinstxtractor to extract its source code archive in binary (by just running python pyinstxtractor.py ./backdoor or something), now many .pyc files are extracted. Find src.pyc and it's malformed as Python3.9, so https://github.com/rocky/python-uncompyle6/ denies to decompile. But challenge information says it's Python3.8, so I write helloworld python script and execute it with Python3.8. It yields Python3.8 .pyc file. Analyze it and find signature is \x55. Change src.pyc's signature from \x61 to \x55 and decompile by running uncompyle6 backdoor-src.38.pyc > backdoor-src.py
- I got hacked with a python script
-
Is there a way for me to secure docker images deployed on-premise?
which boils down to slapping the Python Interpreter + the code in an executable form it is trivially easy to access the code inside such executables: https://github.com/extremecoders-re/pyinstxtractor
What are some alternatives?
PyInstaller - Freeze (package) Python programs into stand-alone executables
python-uncompyle6 - A cross-version Python bytecode decompiler
fbs-tutorial - Tutorial for creating Python/Qt GUIs with fbs
huami-token - Script to obtain watch or band bluetooth token from Huami servers
stuff - Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
decompile-py2exe - Decompile pyc
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
nodemcu-pyflasher - Self-contained NodeMCU flasher with GUI based on esptool.py and wxPython.
synack-red-team-five-ctf
fapro - Fake Protocol Server
ktool - pip install k2l | Mach-O + Obj-C analysis TUI / CLI kit and library. Zero compiled deps, runs anywhere with a python interpreter.
pyinstaller-hooks-contrib - Community maintained hooks for PyInstaller.