A native Python cross-version decompiler and fragment decompiler that translates Python bytecode back into equivalent Python source code, accepting bytecodes from Python version 1.0 to version 3.8, including Dropbox's Python 2.5 bytecode and some PyPy bytecodes. It utilizes compiler technology to create a parse tree of the program from the instructions, allowing for a deeper understanding of Python bytecode sections and the ability to deparse just fragments of source code.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A tool designed to handle archive file data and augment Yara's capabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.