/mysterium

Mysterium the first tool which permits you to retrieve the most part of a Python code even the .py or .pyc was extracted from an executable file, even it is encrypted with every existing encryptage. Mysterium don't make any difference between encrypted and non encrypted files, it can retrieve code from Pyarmor or .pyc files.

Primary LanguagePythonMIT LicenseMIT

­ ­ ­ ­ ­ 𝙈 ­ ­ ­ ­ ­ ­ ­ 𝙔 ­ ­ ­ ­ ­ ­ ­ 𝙎 ­ ­ ­ ­ ­ ­ ­ 𝙏 ­ ­ ­ ­ ­ ­ ­ 𝙀 ­ ­ ­ ­ ­ ­ ­ 𝙍 ­ ­ ­ ­ ­ ­ ­ 𝙄 ­ ­ ­ ­ ­ ­ ­ 𝙐 ­ ­ ­ ­ ­ ­ ­ 𝙈

mysterium_logo (1)

Mysterium has been entirely made by @venaxyt, helped by @IDRALOU.
Mysterium usage:
- If the file to be inspect extension is ".py" or ".pyc": You only have to drag it into Mysterium.
- If the file to be inspect extension is ".exe": If you don't know how to decompile an executable Python file, so you can wait for next Mysterium updates.
- If the file to be inspect is obfuscated with Pyarmor: You put the Python file and the pytransform folder into a zip file, drag it into Mysterium and input the Python file name.

mysterium

Mysterium official Discord server: discord.gg/mysterium | https://discord.gg/ccufCedf44

V ­ ­ E ­ ­ N ­ ­ A ­ ­ X