filmov
tv
Python Executable Decompile | Python File Reverse Engineering | pyinstxtractor | PentestHint

Показать описание
#python #reverseengineering #decompiler #pentesthint #hindi #penetrationtesting #vulnerabilityassessment #pentesthint #chandanghodela
Join this channel to get access to perks:
PyInstaller Extractor is a Python script to extract the contents of a PyInstaller generated executable file.
The header of the pyc files are automatically fixed so that a Python bytecode decompiler will recognize it. The script can run on both Python 2.x and 3.x. PyInstaller versions 2.0, 2.1, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.5.1, 4.6, 4.7, 4.8, 4.9, 4.10, 5.0, 5.0.1, 5.1, 5.2, 5.3, 5.4, 5.4.1, 5.5, 5.6, 5.6.1, 5.6.2, 5.7.0, 5.8.0, 5.9.0, 5.10.0, 5.10.1, 5.11.0, 5.12.0 are tested & supported. Probably will work with other versions too.
It is recommended to run the script in the same version of Python which was used to generate the executable. This is to prevent unmarshalling errors(if any) while extracting the PYZ archive.
Covered:
00:01 - Introduction of Desktop Application Pentesting
00:31 - About PyQT QMainWindow
01:39 - About Pyinstxtractor
03:05 - Python Executable Reverse Engineering
04:38 - How to decompile .pyc file
06:59 - Mitigation of vulnerable python less obfuscate code
Join this channel to get access to perks:
PyInstaller Extractor is a Python script to extract the contents of a PyInstaller generated executable file.
The header of the pyc files are automatically fixed so that a Python bytecode decompiler will recognize it. The script can run on both Python 2.x and 3.x. PyInstaller versions 2.0, 2.1, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.5.1, 4.6, 4.7, 4.8, 4.9, 4.10, 5.0, 5.0.1, 5.1, 5.2, 5.3, 5.4, 5.4.1, 5.5, 5.6, 5.6.1, 5.6.2, 5.7.0, 5.8.0, 5.9.0, 5.10.0, 5.10.1, 5.11.0, 5.12.0 are tested & supported. Probably will work with other versions too.
It is recommended to run the script in the same version of Python which was used to generate the executable. This is to prevent unmarshalling errors(if any) while extracting the PYZ archive.
Covered:
00:01 - Introduction of Desktop Application Pentesting
00:31 - About PyQT QMainWindow
01:39 - About Pyinstxtractor
03:05 - Python Executable Reverse Engineering
04:38 - How to decompile .pyc file
06:59 - Mitigation of vulnerable python less obfuscate code
Комментарии