Python Executable Decompile | Python File Reverse Engineering | pyinstxtractor | PentestHint

preview_player
Показать описание
#python #reverseengineering #decompiler #pentesthint #hindi #penetrationtesting #vulnerabilityassessment #pentesthint #chandanghodela

Join this channel to get access to perks:

PyInstaller Extractor is a Python script to extract the contents of a PyInstaller generated executable file.

The header of the pyc files are automatically fixed so that a Python bytecode decompiler will recognize it. The script can run on both Python 2.x and 3.x. PyInstaller versions 2.0, 2.1, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.5.1, 4.6, 4.7, 4.8, 4.9, 4.10, 5.0, 5.0.1, 5.1, 5.2, 5.3, 5.4, 5.4.1, 5.5, 5.6, 5.6.1, 5.6.2, 5.7.0, 5.8.0, 5.9.0, 5.10.0, 5.10.1, 5.11.0, 5.12.0 are tested & supported. Probably will work with other versions too.

It is recommended to run the script in the same version of Python which was used to generate the executable. This is to prevent unmarshalling errors(if any) while extracting the PYZ archive.

Covered:
00:01 - Introduction of Desktop Application Pentesting
00:31 - About PyQT QMainWindow
01:39 - About Pyinstxtractor
03:05 - Python Executable Reverse Engineering
04:38 - How to decompile .pyc file
06:59 - Mitigation of vulnerable python less obfuscate code
Рекомендации по теме
Комментарии
Автор

Please sir continue this playlist 🙏🙏🙏🙏🙏

uqhjxys
Автор

Sir g apne jo website btai he usse decompile nh hora he😢

ForexCryptoworld
Автор

Meri ek fole he usko krna paid he project

technicalknowledge
Автор

Thank you for this video sir

sir do u provide any traning in cyber security?

please provide your contact details

adityachauhan