pyc2bytecode
Bytecode analyzer
A tool to disassemble and analyze compiled Python bytecode files (pyc) from various Python versions.
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
133 stars
8 watching
24 forks
Language: Python
last commit: over 1 year ago blueteamcybersecuritydisassemblerinfosecinfosectoolsmalware-analysismalware-researchpythonreverse-engineeringsecurity-toolsstatic-analysisthreat-intelligence
Related projects:
Repository | Description | Stars |
---|---|---|
| A toolset for analyzing and manipulating Java bytecode | 2,003 |
| Provides language support and features for Python development in Visual Studio Code | 1,726 |
| A tool for analyzing and matching source code with binary data to extract useful information about functions and symbols. | 635 |
| A tool to analyze and report on the complexity and maintainability of Python codebases | 1,751 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A tool for collaborative reverse engineering of binary files using multiple disassemblers and decompilers. | 135 |
| An EVM bytecode disassembler and analysis tool for Ethereum contracts. | 844 |
| A Python-based disassembler tool with data/control flow analysis capabilities for reverse engineering | 397 |
| A tool for disassembling and analyzing 8-bit machine code ROMs. | 2 |
| Analyzes Java bytecode to identify potential deserialization vulnerabilities. | 240 |
| An educational tool for static code analysis in Python programming | 92 |
| A tool to monitor and analyze the behavior of real-time systems written in Python | 32 |
| A JupyterLab extension for inspecting and comparing Python bytecode across different versions of the CPython interpreter. | 62 |
| Decodes and analyzes encoded PowerShell scripts to identify potential shellcode and reverse-engineered APIs. | 215 |
| An analysis tool for estimating the likelihood of binary compression or encryption | 43 |