pyinstxtractor
huami-token
pyinstxtractor | huami-token | |
---|---|---|
11 | 7 | |
2,436 | 376 | |
- | - | |
5.1 | 0.0 | |
20 days ago | over 1 year ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyinstxtractor
- Pasar de un .exe a un .py
-
Hack The Box - Vessel [Hard] - Walkthrough
I have used pyinstxtractor to extract the *.pyc files, and then the uncomplyle6 to decompile the *.pyc files. Which has led me to the actual source code of the binary:
-
How to reverse .EXE to .Py
Also, be real, you mention you use it once in the credits at the bottom of your readme while also advertising your mate's tool that ALSO looks like it uses identical code to the original, this time without even mentioning it. And given he also makes CS:GO cheat tools by the looks of it, I struggle to understand why any of you think you have the moral high ground in any of this...
-
Synack Red Team Five CTF Writeup - Rev
It's a Pyinstaller binary.(I have used it once before, so I just knew it by checking the file.) Use https://github.com/extremecoders-re/pyinstxtractor to extract its source code archive in binary (by just running python pyinstxtractor.py ./backdoor or something), now many .pyc files are extracted. Find src.pyc and it's malformed as Python3.9, so https://github.com/rocky/python-uncompyle6/ denies to decompile. But challenge information says it's Python3.8, so I write helloworld python script and execute it with Python3.8. It yields Python3.8 .pyc file. Analyze it and find signature is \x55. Change src.pyc's signature from \x61 to \x55 and decompile by running uncompyle6 backdoor-src.38.pyc > backdoor-src.py
-
avoid contractor exploiting tkinter software...
If it's a pyinstaller blob, you can crack it open with tools like https://github.com/extremecoders-re/pyinstxtractor
- I got hacked with a python script
-
Quick and easiest way to convert python project to exe
auto-py-to-exe is a GUI interface for PyInstaller (a famous freezer packager for python projects). While very user friendly, it should be noted that the .exe made using PyInstaller (or auto-py-to-exe) is very easy to reverse engineer (https://github.com/extremecoders-re/pyinstxtractor).
- Converting an exe back to .py
-
Is there a way for me to secure docker images deployed on-premise?
which boils down to slapping the Python Interpreter + the code in an executable form it is trivially easy to access the code inside such executables: https://github.com/extremecoders-re/pyinstxtractor
- Need to decompile an exe compiled with PyInstaller
huami-token
-
Do custom faces using an iPhone still stop functions like music control?
I’ve read on here that I could use https://github.com/argrento/huami-token And the use Amazntools. But a comment mention this breaks some functions.
-
Is there any way to sync third-party watch face for miband 6 on iphones?
Use huami-token (Xiaomi account method) to get the linking token to use the AmazTools app with the band
- Install Custom WatchFace on Iphone
-
iOS watch faces on Mi Band 6 / authentication key
I got the Mi Band 6 yesterday, downloaded the Mi Fit app, set up everything (including FW upgrade). I downloaded Amaztools (iOS) to find better watch faces. The new FW upgrade seems to require an authentication key. Unfortunately, the Python script available ( GitHub - argrento/huami-token: Script to obtain watch or band bluetooth token from Huami servers ) does not fetch my authentication key from Huami servers; it seems my band is not properly registered. Has anybody found a solution to install custom watch faces in iOS (15) or am I stuck with the childish watch faces the "store" in the Mi Fit app comes with?
-
How to retrieve the auth key of my miband in Xiaomi Wear (com.xiaomi.wearable, Android)?
You can try this if you have a Xiaomi account: https://github.com/argrento/huami-token
-
Live heart rate monitoring on PC
Well, I managed to get my auth key without root and without installing anything, I just had to add a "mi account" to my mi fit app. And then I ran the https://github.com/argrento/huami-token python program in my pc, but you could use https://codeberg.org/vanous/huafetcher as an app in your cellphone instead.
-
Mi smart band 6 non-discoverable
I was pretty close with this (got the auth_key from the python script): https://github.com/argrento/huami-token
What are some alternatives?
PyInstaller - Freeze (package) Python programs into stand-alone executables
python-miio - Python library & console tool for controlling Xiaomi smart appliances
fbs-tutorial - Tutorial for creating Python/Qt GUIs with fbs
miband-6-heart-rate-monitor - Heart rate monitor website for Mi Band 6
python-uncompyle6 - A cross-version Python bytecode decompiler
OneByteWallhack - CS:GO wallhack achieved by patching one byte of game memory. Written in Python 3.
stuff - Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
tastyworks_api - An unofficial, reverse-engineered Python API for tastyworks.
decompile-py2exe - Decompile pyc
miband-5-heart-rate-monitor - Heart rate monitor website for Mi Band 4 and 5
nodemcu-pyflasher - Self-contained NodeMCU flasher with GUI based on esptool.py and wxPython.
unipacker - Automatic and platform-independent unpacker for Windows binaries based on emulation