Skip to content

Graphical and scriptable Python bytecode and executable reverse engineering environment (mirrored from Codeberg)

License

Notifications You must be signed in to change notification settings

hexadecimalDinosaur/scalpyl

Repository files navigation

Scalpyl

Scalpyl is a graphical and scriptable Python bytecode and executable reverse engineering environment intended to be the successor to the pycDisGUI disassembler GUI. This project is a work-in-progress.

Current Python bytecode and executables reverse engineering has many individual command-line tools with a lack of any tooling focusing on ease-of-use, graphical interfaces, and integrations with other tools. This project aims to integrate all the different tools in the Python reverse engineering ecosystem together.

Design Goals

The following are the goals for the development of this project, as this project is a work-in-progress, they are still being worked on and may not be completed or implemented yet.

  • Work with Python bytecode compiled for any Python version
  • Provide wrappers with a standardized API for many different disassemblers and decompilers like dis, xdis, pycdc, decompyle3, and PyLingual
  • Integrations with unpacker and deobfuscation tools like pyinstxtractor-ng to enable the analysis of executable binaries and obfuscated bytecode
  • Provide an interface for patching Python on a bytecode level
  • Easy to use graphical interface similar to those found in dnSpy and Recaf

About

Graphical and scriptable Python bytecode and executable reverse engineering environment (mirrored from Codeberg)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published