Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the intricacies of reverse engineering Python binaries in this 29-minute PyCon US talk by Josh Wiedemeier. Delve into the world of Python bytecode (.pyc) files and learn how to interpret and decompile them manually using a simple example. Discover the techniques used by companies and malware authors to distribute products and payloads as bytecode, believing their logic to be unreadable. Gain insights into the challenges and solutions for automating Python decompilation. Aimed at curious intermediate Python developers and reverse engineers, this presentation offers a unique perspective on recovering Python source code from bytecode, distinguishing itself from previous bytecode-oriented talks that focus primarily on Python's execution model. Access the accompanying slides for a comprehensive visual guide to the concepts discussed.
Syllabus
Talks - Josh Wiedemeier: There and Back Again: Reverse Engineering Python Binaries
Taught by
PyCon US