-
Often times in obfuscated binaries, there will be instructions at a wrong address. Binary Ninja handles overlapping code with no issue, but the process to navigate to the correct address and creating …
-
What do you do when you want to pass in children as an array or as an object, or as a const. I'll give an example below.
# Breadcrumbs example
For Breadcrumbs, the number of "crumbs" ends up bein…
-
### Checks
- [X] I have checked that this issue has not already been reported.
- [X] I have confirmed this bug exists on the [latest version](https://pypi.org/project/polars/) of Polars.
### Re…
-
In the context of https://github.com/burrowers/garble/issues/276#issuecomment-864613749, I've been thinking that there are scenarios where one might want to obfuscate only some packages: when publishi…
mvdan updated
4 months ago
-
# Summary
How to get Elpy to use type information and completions from stubs `*.pyi`
files
# Steps to reproduce
Create a Python project using gRPC (grpcio-tools, grpcio). The generated files
…
-
```
import bz2
import os
import quopri
import random
import base64
import random
import platform
import traceback
import itertools
import re
import autopep8
def try_deobfuscate(code, tec…
-
Hey!
Thanks for the interesting project!
1. To eliminate warnings such as 'integer constant is too large,' it's necessary to generate specific type modifiers for constant integers in the expressio…
-
I downloaded Meteor client version 0.5.6 and scanned the JAR file just for fun, and surprisingly it showed that it is malware https://www.virustotal.com/gui/file/0058cfe2b24392bb6d84a7cbae10c66ecadfce…
-
### Observed behavior
Half-written documentation, only 2 use-cases provided. Micro-example is hard to understand and not clear.
### Expected behavior
Proper documentation, with steps on how to se…
-
### Problem Statement
My app code is obfuscated with Babel Obfuscator.
Would it be possible to de-obfuscate stack traces automatically?
### Solution Brainstorm
1. Add the possibility to upload a m…