Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/venaxyt/mysterium
Mysterium the first tool which permits you to retrieve the most part of a Python code even the .py or .pyc was extracted from an executable file, even it is encrypted with every existing encryptage. Mysterium don't make any difference between encrypted and non encrypted files, it can retrieve code from Pyarmor or .pyc files.
https://github.com/venaxyt/mysterium
deobfuscator inspect-code mysterium pyarmor pyarmor-decompilator pyarmor-decryptor pyarmor-deobfuscator pyc-decompiler pyc-decryptor pyc-deobfuscator python python-code-inspector python-code-pyc python-decryptor python-deobfuscator python-unpyarmor un-pyarmor un-pyc unpyarmor
Last synced: about 19 hours ago
JSON representation
Mysterium the first tool which permits you to retrieve the most part of a Python code even the .py or .pyc was extracted from an executable file, even it is encrypted with every existing encryptage. Mysterium don't make any difference between encrypted and non encrypted files, it can retrieve code from Pyarmor or .pyc files.
- Host: GitHub
- URL: https://github.com/venaxyt/mysterium
- Owner: venaxyt
- License: mit
- Created: 2021-09-02T20:22:30.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-05-18T21:11:10.000Z (6 months ago)
- Last Synced: 2024-11-09T17:52:21.930Z (3 days ago)
- Topics: deobfuscator, inspect-code, mysterium, pyarmor, pyarmor-decompilator, pyarmor-decryptor, pyarmor-deobfuscator, pyc-decompiler, pyc-decryptor, pyc-deobfuscator, python, python-code-inspector, python-code-pyc, python-decryptor, python-deobfuscator, python-unpyarmor, un-pyarmor, un-pyc, unpyarmor
- Language: Python
- Homepage: https://github.com/venaxyt/mysterium
- Size: 12.9 MB
- Stars: 181
- Watchers: 8
- Forks: 31
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# **𝙈 𝙔 𝙎 𝙏 𝙀 𝙍 𝙄 𝙐 𝙈**
![mysterium_logo (1)](https://user-images.githubusercontent.com/81310818/132258721-dc02bb73-772c-4530-a636-4daffbcdc23a.png)
```
Mysterium has been entirely made by @venaxyt.
```
```
Mysterium usage:
- If the file to be inspect extension is ".py" or ".pyc": You only have to drag it into Mysterium.
- If the file to be inspect extension is ".exe": If you don't know how to decompile an executable Python file, so you can wait for next Mysterium updates.
- If the file to be inspect is obfuscated with Pyarmor: You put the Python file and the pytransform folder into a zip file, drag it into Mysterium and input the Python file name.
```
![mysterium](https://user-images.githubusercontent.com/81310818/132141525-0bfb0f6e-a0d4-4770-8861-97622160baff.PNG)
### **YouTube Tutorial (FR): https://www.youtube.com/watch?v=1idhXNeluCc**
> ### **Contact me on Telegram if you want to buy my PyArmor complete decryption tool (200$): https://t.me/srevna**
### **All I ask is that you don't contact me for nothing, I remind you that the tool is chargeable and that I don't provide anything until we've completed the transaction, too many people have ripped me off or wasted my time, whether it's for screenshots or anything else, so I don't do it again until payment has been made. Thank you for your understanding. (Because of this type of people: https://github.com/venaxyt/mysterium/blob/main/just%20an%20example.jpg)**
### **VIDEO Tutorial (FR): https://www.youtube.com/watch?v=1idhXNeluCc**
https://t.me/srevna (The tool costs 200$)
> ## **V E N A X**