Extract .pyc files from executables created with py2exe
☆286Feb 24, 2023Updated 3 years ago
Alternatives and similar repositories for unpy2exe
Users that are interested in unpy2exe are comparing it to the libraries listed below
Sorting:
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268May 11, 2023Updated 2 years ago
- Decompile py2exe Python 3 generated EXEs☆114Aug 7, 2022Updated 3 years ago
- A helper script for unpacking and decompiling EXEs compiled from python code.☆997Aug 15, 2024Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- C++ python bytecode disassembler and decompiler☆4,336Aug 30, 2025Updated 6 months ago
- uncompyle2☆648Jun 25, 2015Updated 10 years ago
- A Reverse Engineering Tool for py2exe applications.☆210May 21, 2017Updated 8 years ago
- Tracing execution of python bytecode☆10Aug 2, 2019Updated 6 years ago
- A cross-version Python bytecode decompiler☆4,243Feb 8, 2026Updated last month
- Python 2.7 decompiler☆1,204Jun 19, 2021Updated 4 years ago
- PyInstaller Extractor☆4,160Oct 20, 2025Updated 5 months ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- An ELF format manipulation library in python☆18Feb 9, 2017Updated 9 years ago
- Decompiler of python executable files created in pyinstaller and pyarmor and decompiler of .pyc files☆13May 8, 2022Updated 3 years ago
- ☆10Feb 23, 2024Updated 2 years ago
- A deobfuscator for PjOrion, python cfg generator and more☆78Jul 10, 2017Updated 8 years ago
- Python decompiler for 3.7-3.8 Stripped down from uncompyle6 so we can refactor and start to fix up some long-standing problems☆1,247Nov 18, 2025Updated 4 months ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- ☆16Dec 3, 2020Updated 5 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆577Feb 23, 2026Updated 3 weeks ago
- Elevation by environment variable expansion☆64Nov 24, 2016Updated 9 years ago
- Making GO reversing easier in IDA Pro☆658Jun 22, 2020Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Quickly debug shellcode extracted during malware analysis☆627May 23, 2023Updated 2 years ago
- simple Elf disassembler☆10Dec 30, 2014Updated 11 years ago
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆31Apr 4, 2021Updated 4 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- A generic deobfuscator for PjOrion obfuscated python scripts☆122Feb 20, 2024Updated 2 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- This repository contains Python 2.7 scripts for parsing MFS/MFSB partition and extracting contained files.☆34Dec 19, 2017Updated 8 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 5 years ago