Svenskithesource / PyArmor-Unpacker

A deobfuscator for PyArmor.
GNU General Public License v3.0
493 stars 73 forks source link

The executable used python version 3.7 and closed immediately #29

Closed 20521429 closed 1 year ago

20521429 commented 1 year ago

maybe i cant use any of 3 methods with that conditions how i can handle it ?

Svenskithesource commented 1 year ago

You can use a debugger to pause it while it's running or you can see what packages it uses and hook/hijack those and pause in them so you have time to use method 1 or 2. You will have to change the detection script, if you scroll down you will see "tkinter" which you'll have to change with the name of the package that you replaced.

Twi1ight-source commented 1 year ago

with executable has pyinstaller and pyarmor, should i first extract use pyinstxtractor.py then run pyc file and debug to inject or just debug executable and inject ?

Svenskithesource commented 1 year ago

Extract the executable and run the .pyc file. That way you can run it with your installed Python version and you'll have access to all the built-in modules, which the executable might not have.

Twi1ight-source commented 1 year ago

i run pyc file and it also exits quickly, i didnt know how to debug pyc file, so i decompiled it into py file to debug, but when i use visual studio or pdb,... i cant inject

do you know any solution ?

Svenskithesource commented 1 year ago

You can use a debugger to pause it while it's running or you can see what packages it uses and hook/hijack those and pause in them so you have time to use method 1 or 2. You will have to change the detection script, if you scroll down you will see "tkinter" which you'll have to change with the name of the package that you replaced.

Have you tried this? What were the issues with it?

Twi1ight-source commented 1 year ago

i think i know the problem, im dealing with a super mode which these methods dont support