Extract contents of a Windows executable file created by pyinstaller
...The contents of the pyz file (usually pyc files) present inside the executable are also extracted.
The pyc files are made valid so that a python bytecode decompiler will recognise it.
Script can run on both python 2.x and 3.x
Pyinstaller versions 2.0, 2.1, 3.0, 3.1 and 3.2 are supported
After a program has been thrown into the world in binary form, it can boomerang back as source code. The Boomerang reverse engineering framework is the first general native executable decompiler available to the public.
Java Decompiler, Disassembler and Bytecode debugger. Decompiler supports Java 5 (e.g. generics, for-each loops etc). Debugger allows user to step through each bytecode and view program state. Contains Swing GUI.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
JReversePro is a Java Decompiler / Disassembler written in Java. Facility to view the ConstantPool contents is available. AWT, Swing and command-line versions are present.
The aim of this project is to develope a decompiler for java which is platform independent and has options to obfuscate the class file also.
The project takes class file as input and decompiles it and provides the source file.
Java-program to read, modify and execute class-files. a real java VM written in java or a decompiler for class-files is possible (and partially working)