https://github.com/call-042PE/PyInjector
PyInjector - Inject Python code into python process.
https://github.com/call-042PE/PyInjector
Last synced: 11 days ago
JSON representation
PyInjector - Inject Python code into python process.
- Host: GitHub
- URL: https://github.com/call-042PE/PyInjector
- Owner: call-042PE
- License: gpl-3.0
- Created: 2021-07-06T16:26:57.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-06-16T09:12:09.000Z (10 months ago)
- Last Synced: 2024-11-05T02:36:13.749Z (5 months ago)
- Language: C++
- Size: 3.23 MB
- Stars: 172
- Watchers: 2
- Forks: 24
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-python-re - PyInjector - An injector for Windows that allows you to inject Python code into any Python process. It can be useful to expose variables, functions, grab code objects and many other things. (Bytecode / Manual analysis)
README
# PyInjector
PyInjector - Inject Python code into python process.## How to use it ?
Simply write the code you want to inject into a file called code.py.
The file as to be in the same folder of the software you want to inject it.
You can also write it directly in the dll and recompile it.## Why injecting python code into python script ?
This project is made for reverse-engineer and malware analyst, the main aspect of this project is to reverse-engineer any python script/executable easily.
I put some usefull script in the src/ folder that can be used to reverse-engineer any script (even with pyarmor).## Compatibilities
PyInjector is compatible with x32 and x64, python 3.7,3.8,3.9,3.10,3.11,3.12.## Exemple
In this [video](https://youtu.be/NkFs7A0q4DM) im unpacking a function in a pyarmor protected script with PyInjector.