pyinstxtractor
PEASS-ng
pyinstxtractor | PEASS-ng | |
---|---|---|
11 | 90 | |
2,436 | 14,899 | |
- | 1.4% | |
5.1 | 8.3 | |
20 days ago | 13 days ago | |
Python | C# | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyinstxtractor
- Pasar de un .exe a un .py
-
Hack The Box - Vessel [Hard] - Walkthrough
I have used pyinstxtractor to extract the *.pyc files, and then the uncomplyle6 to decompile the *.pyc files. Which has led me to the actual source code of the binary:
-
How to reverse .EXE to .Py
Also, be real, you mention you use it once in the credits at the bottom of your readme while also advertising your mate's tool that ALSO looks like it uses identical code to the original, this time without even mentioning it. And given he also makes CS:GO cheat tools by the looks of it, I struggle to understand why any of you think you have the moral high ground in any of this...
-
Synack Red Team Five CTF Writeup - Rev
It's a Pyinstaller binary.(I have used it once before, so I just knew it by checking the file.) Use https://github.com/extremecoders-re/pyinstxtractor to extract its source code archive in binary (by just running python pyinstxtractor.py ./backdoor or something), now many .pyc files are extracted. Find src.pyc and it's malformed as Python3.9, so https://github.com/rocky/python-uncompyle6/ denies to decompile. But challenge information says it's Python3.8, so I write helloworld python script and execute it with Python3.8. It yields Python3.8 .pyc file. Analyze it and find signature is \x55. Change src.pyc's signature from \x61 to \x55 and decompile by running uncompyle6 backdoor-src.38.pyc > backdoor-src.py
-
avoid contractor exploiting tkinter software...
If it's a pyinstaller blob, you can crack it open with tools like https://github.com/extremecoders-re/pyinstxtractor
- I got hacked with a python script
-
Quick and easiest way to convert python project to exe
auto-py-to-exe is a GUI interface for PyInstaller (a famous freezer packager for python projects). While very user friendly, it should be noted that the .exe made using PyInstaller (or auto-py-to-exe) is very easy to reverse engineer (https://github.com/extremecoders-re/pyinstxtractor).
- Converting an exe back to .py
-
Is there a way for me to secure docker images deployed on-premise?
which boils down to slapping the Python Interpreter + the code in an executable form it is trivially easy to access the code inside such executables: https://github.com/extremecoders-re/pyinstxtractor
- Need to decompile an exe compiled with PyInstaller
PEASS-ng
-
Great enumeration scripts?
Once on a system, something like Linpeas or Winpeas would be useful: https://github.com/carlospolop/PEASS-ng
-
HackersToolKit.co - One-Stop Shop for Tool Commands for CTFs, bug bounty, and Penetration Testing
Reject internet, embrace man. TBH it is not usefull at all, it is just in manual or embedded in kali, like basic webshells for example. It is cool to do such thing as a little free time project to learn about hosting and developing a website, but usefulnes for broader audience is minimal I think. For everyday use https://book.hacktricks.xyz are the best in my opinion.
-
Allowed tools for OSCP
I'm taking my OSCP exam next Wednesday and was just wondering on what tools are actually prohibited and which are not. I'm specifically referring to linpeas, winpeas, seatbelt. I often times run these tools when I've exausted my enumeration methods for a quick find. Are these tools allowed on the AD set and the individual machines?
-
Qualified to write a technical book ?
Seems like a cart before horse situation. Why not just release the cheat sheet you have now and see how it does? I like Carlos Polop's approach with HackTricks -- https://book.hacktricks.xyz/ -- he offers previews of new content to his patrons.
-
For cycle inside a list
Hi I don't understand the self.files attribute in this code: https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/builder/src/fileRecord.py
- LinPEAS
-
What are the alternative tools for wmic on cmd?
I'd recommend poking around at github and see what you find. A good starting point is WinPEAS if you're looking for automation. Seatbelt might also be helpful
- What are the alternatives for wmic on cmd?
- Need an ex OSCP candidate to share their experiences.
-
Hack The Box - Vessel [Hard] - Walkthrough
Using linpeas I found some useful information over the user steven
What are some alternatives?
PyInstaller - Freeze (package) Python programs into stand-alone executables
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
fbs-tutorial - Tutorial for creating Python/Qt GUIs with fbs
warp-plus-cloudflare - Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) [GET https://api.github.com/repos/ALIILAPRO/warp-plus-cloudflare: 403 - Repository access blocked]
python-uncompyle6 - A cross-version Python bytecode decompiler
pimpmykali - Kali Linux Fixes for Newly Imported VM's
huami-token - Script to obtain watch or band bluetooth token from Huami servers
CCStopper - [Archived] Stops Adobe's pesky background apps and more 😉
stuff - Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
decompile-py2exe - Decompile pyc
GTFONow - Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.