PyExtractor is a decompiler that can fully decompile exe's compiled with pyinstaller or py2exe

Overview

PyExtractor ๐Ÿ

๐ŸŒŒ ใƒปDiscord โ‹ฎ ๐Ÿ ใƒปGetting started โ‹ฎ ๐Ÿ“œ ใƒปChangeLog

PyExtractor was made by

Love โŒ code โœ…


๐Ÿ”ฐ ใ€ข Features

โœ” Fully Decompiles executables compiled with pyinstaller or py2exe (.exe --> .py)
โœ” Decrypts Encrypted pyinstaller executables and detects pyarmor
โœ” Configurable with json config
โœ” Exe must NOT be compiled with a python compiler in order for PyExtractor to check it
โœ” Checks file(s) for suspicious words, discord webhooks, discord invites, pastebins, urls, ips etc..
โœ” Check if the file hash is a known malware/virus
โœ” Fetches general info and sections about the binary


๐Ÿ ใ€ข Getting started with PyExtractor!

First go ahead and download Git

[email protected] or higher

Open cmd in a chosen directory and do the following:

$ git clone https://github.com/Rdimo/PyExtractor.git
...
$ cd .\PyExtractor
$ start setup.bat
...
$ echo Done!

or

# Downloading as zip
$ Press big green code button top right of the screen
$ Press download ZIP
$ Drag the zip out to your desktop or some other place
$ Extract it. . .
...
$ Open the extracted folder
$ Run setup.bat
$ Done!

Make sure to open config.json and change the settings to your preferences โ‡ฃโ‡ฃโ‡ฃ

{
  "detailed_logs": false, //Console logs the binary sections and general info
  "error_stack_logs": true, //Send out full error message
  "time_stamp_logging": true, //Timestamp in the logs.log file

  "analyse_file": true, //Checks the file(s) for suspicious words, discord webhooks, discord invites, pastebins, urls, ips etc..
  "malware_recognize": true //Check if the file hash is a known malware/virus
}

๐ŸŽ‰ ใ€ข ideas/todo?

  • Check for more things
  • Better malware recognizer
  • Remove chdir
  • More config options

๐Ÿ’ญ ใ€ข ChangeLog

v0.0.3 โ‹ฎ 2022-05-09
+ Cleaner code

v0.0.2 โ‹ฎ 2022-05-09
+ Bug fixes

v0.0.1 โ‹ฎ 2022-05-09
+ Official release
Owner
Rdimo
16.1 y/o swede. I make softwares for educational purposes only ๐Ÿ’€
Rdimo
๐ŸŽป Modularized exploit generation framework

Modularized exploit generation framework for x86_64 binaries Overview This project is still at early stage of development, so you might want to come b

แด€แด‡๊œฑแดแด˜สœแดส€ 30 Jan 17, 2022
Course: Information Security with Python

Curso: Seguranรงa da Informaรงรฃo com Python Curso realizado atravรจs da Plataforma da Digital Innovation One Prof: Bruno Dias Conteรบdo: Introduรงรฃo aos co

Elizeu Barbosa Abreu 1 Nov 28, 2021
A DOM-based G-Suite password sprayer and user enumerator

A DOM-based G-Suite password sprayer and user enumerator

Mayk 1 Apr 07, 2022
Brute force attack tool for Azure AD Autologon/Seamless SSO

Brute force attack tool for Azure AD Autologon

nyxgeek 89 Jan 02, 2023
A simple subdomain scanner in python

Subdomain-Scanner A simple subdomain scanner in python โœจ Features scans subdomains of a domain thats it! ๐Ÿ’โ€โ™€๏ธ How to use first download the scanner.p

Portgas D Ace 2 Jan 07, 2022
Oh365UserFinder is used for identifying valid o365 accounts without the risk of account lockouts.

Oh365 User Finder Oh365UserFinder is used for identifying valid o365 accounts without the risk of account lockouts. The tool parses responses to ident

Joe Helle 414 Jan 02, 2023
Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities.

๐Ÿ‘‘ Recon ๐Ÿ‘‘ The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my ow

Dirso 171 Dec 31, 2022
Python Password Generator

This is a console-based version of a password generator written with Python. The program generates a password based on numbers of letters, numbers, and symbols specified by the user. This is a simple

p.katekomol 1 Jan 24, 2022
Big-Papa Integrates Javascript and python for remote cookie stealing which then can be used for session hijacking

Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication

77 Jan 03, 2023
log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc

่ฏดๆ˜Ž about author: ๆˆ‘่ถ…ๆ€•็š„ blog: https://www.cnblogs.com/iAmSoScArEd/ github: https://github.com/iAmSOScArEd/ date: 2021-12-20 log4j2 dos exploit log4j2 do

3 Aug 13, 2022
Python implementation for PrintNightmare using standard Impacket.

PrintNightmare Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) using standard Impacket. Installtion $ pip3 install impacket

ollypwn 141 Dec 31, 2022
WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.

WinRemoteEnum WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user, sharing the goal of remotely gather

Simon 9 Nov 09, 2022
๐™พ๐š™๐šŽ๐š— ๐š‚๐š˜๐šž๐š›๐šŒ๐šŽ ๐š‚๐šŒ๐š›๐š’๐š™๐š - ๐™ฝ๐š˜ ๐™ฒ๐š˜๐š™๐šข๐š›๐š’๐š๐š‘๐š - ๐šƒ๐šŽ๐šŠ๐š– ๐š†๐š˜๐š›๐š” - ๐š‚๐š’๐š–๐š™๐š•๐šŽ ๐™ฟ๐šข๐š๐š‘๐š˜๐š— ๐™ฟ๐š›๐š˜๐š“๐šŽ๐šŒ๐š - ๐™ฒ๐š›๐šŽ๐šŠ๐š๐šŽ๐š ๐™ฑ๐šข : ๐™ฐ๐š•๐š• ๐šƒ๐šŽ๐šŠ๐š– - ๐™ฒ๐š˜๐š™๐šข๐™ฟ๐šŠ๐šœ๐š ๐™ฒ๐šŠ๐š— ๐™ฝ๐š˜๐š ๐™ผ๐šŠ๐š”๐šŽ ๐šˆ๐š˜๐šž ๐š๐šŽ๐šŠ๐š• ๐™ฟ๐š›๐š˜๐š๐š›๐šŠ๐š–๐š–๐šŽ๐š›

๐™พ๐š™๐šŽ๐š— ๐š‚๐š˜๐šž๐š›๐šŒ๐šŽ ๐š‚๐šŒ๐š›๐š’๐š™๐š - ๐™ฝ๐š˜ ๐™ฒ๐š˜๐š™๐šข๐š›๐š’๐š๐š‘๐š - ๐šƒ๐šŽ๐šŠ๐š– ๐š†๐š˜๐š›๐š” - ๐š‚๐š’๐š–๐š™๐š•๐šŽ ๐™ฟ๐šข๐š๐š‘๐š˜๐š— ๐™ฟ๐š›๐š˜๐š“๐šŽ๐šŒ๐š - ๐™ฒ๐š›๐šŽ๐šŠ๐š๐šŽ๐š ๐™ฑ๐šข : ๐™ฐ๐š•๐š• ๐šƒ๐šŽ๐šŠ๐š– - ๐™ฒ๐š˜๐š™๐šข๐™ฟ๐šŠ๐šœ๐š ๐™ฒ๐šŠ๐š— ๐™ฝ๐š˜๐š ๐™ผ๐šŠ๐š”๐šŽ ๐šˆ๐š˜๐šž ๐š๐šŽ๐šŠ๐š• ๐™ฟ๐š›๐š˜๐š๐š›๐šŠ๐š–๐š–๐šŽ๐š›

CodeX-ID 2 Oct 27, 2022
Holehe OSINT - Email to Registered Accounts

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

Palenath 3.8k Jan 06, 2023
Polkit - Local Privilege Escalation (CVE-2021-3560)

CVE-2021-3560 Polkit - Local Privilege Escalation Original discovery by kevin_backhouse from GitHub Security Lab References https://github.blog/2021-0

Salman Asad 1 Nov 12, 2021
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228

log4j-honeypot-flask Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228 This can be

Binary Defense 144 Nov 19, 2022
Log4j exploit catcher, detect Log4Shell exploits and try to get payloads.

log4j_catcher Log4j exploit catcher, detect Log4Shell exploits and try to get payloads. This is a basic python server that listen on a port and logs i

EntropyQueen 17 Dec 20, 2021
MTBLLS Ethical Hacking Tool Announcement of v2.0

MTBLLS Ethical Hacking Tool Announcement of v2.0 MTBLLS is a Free and Open-Source Ethical Hacking Tool developed by GhostTD (SkyWtkh) The tool can onl

Ghost 2 Mar 19, 2022
Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading

log4j-detect Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading The script

Vรญctor Garcรญa 187 Jan 03, 2023
logmap: Log4j2 jndi injection fuzz tool

logmap - Log4j2 jndi injection fuzz tool Used for fuzzing to test whether there are log4j2 jndi injection vulnerabilities in header/body/path Use http

ไน‹ไนŽ่€…ไนŸ 67 Oct 25, 2022