Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Just wondering about the use of this #8

Open
theAbdoSabbagh opened this issue Jul 11, 2024 · 1 comment
Open

Just wondering about the use of this #8

theAbdoSabbagh opened this issue Jul 11, 2024 · 1 comment

Comments

@theAbdoSabbagh
Copy link

Hello, amazing project I must say. I tested it on my on exe, it extracted the PYDs and DLLs, but the final extraction is like as if i compiled my app into a standalone exe, i couldnt find anything related to the actual source. So I was wondering how this could be useful

@extremecoders-re
Copy link
Owner

Nuitka transpiles python source to .c code which is then compiled to native code by means of a traditional compiler. As such it is extremely difficult to reverse the process to recover the original high level python sources as during compilation most of the information is lost.

The current objective of the tool is mainly to extract a single file nuitka compiled executable to get back the embedded assets like DLLs, PYDs. binary assets and stuff. In future this may be expanded such as to be able to get a listing of python sources which the executable is built of and be able to locate the addresses of the python functions etc similar to what that is possible with compiled golang binaries today by parsing pclntab and associated metadata.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants