Scalpyl is a graphical and scriptable Python bytecode and executable reverse engineering environment intended to be the successor to the pycDisGUI disassembler GUI. This project is a work-in-progress.
Current Python bytecode and executables reverse engineering has many individual command-line tools with a lack of any tooling focusing on ease-of-use, graphical interfaces, and integrations with other tools. This project aims to integrate all the different tools in the Python reverse engineering ecosystem together.
The following are the goals for the development of this project, as this project is a work-in-progress, they are still being worked on and may not be completed or implemented yet.
- Work with Python bytecode compiled for any Python version
- Provide wrappers with a standardized API for many different disassemblers and decompilers like dis, xdis, pycdc, decompyle3, and PyLingual
- Integrations with unpacker and deobfuscation tools like pyinstxtractor-ng to enable the analysis of executable binaries and obfuscated bytecode
- Provide an interface for patching Python on a bytecode level
- Easy to use graphical interface similar to those found in dnSpy and Recaf