Reverse Engineering Python Binaries - There and Back Again
Offered By: PyCon US via YouTube
Course Description
Overview
Explore the intricacies of reverse engineering Python binaries in this 38-minute PyCon US talk. Delve into the world of Python bytecode (.pyc) files and learn how to interpret and decompile them manually using a simple example. Discover the challenges and solutions involved in automating Python decompilation. Gain insights into recovering Python source code from bytecode, a valuable skill for curious intermediate Python developers and reverse engineers. Unlike previous bytecode-oriented talks, this presentation focuses primarily on source code recovery rather than Python's execution model. Access the accompanying slides for a comprehensive understanding of the topic.
Syllabus
Talks - Josh Wiedemeier: There and Back Again: Reverse Engineering Python Binaries
Taught by
PyCon US
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network