473,587 Members | 2,412 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to avoid reverse code engineering of a python executable

Hi guy's,

Couple of day's ago I asked for your help on how to create a single
file of a python executable. Now I want to proceed a little bit
further asking how can I avoid (or at least make it difficult) for
some one to extract my code by using reverse code engineer techniques?
I came on pyobfuscate but I would like more suggestions and guide to
achieve the most possible security in this matter.

Regards,
Nicoals.

Aug 8 '07 #1
2 2012
On Wed, 08 Aug 2007 11:40:28 +0000, NicolasG wrote:
Couple of day's ago I asked for your help on how to create a single
file of a python executable. Now I want to proceed a little bit
further asking how can I avoid (or at least make it difficult) for
some one to extract my code by using reverse code engineer techniques?
I came on pyobfuscate but I would like more suggestions and guide to
achieve the most possible security in this matter.
Just don't deliver the code at all but provide a webservice.

Everything else can be reverse engineered and possibly will be if it is
worth the trouble.

Ciao,
Marc 'BlackJack' Rintsch
Aug 8 '07 #2
NicolasG <ni******@gmail .comwrites:
Now I want to proceed a little bit further asking how can I avoid
(or at least make it difficult) for some one to extract my code by
using reverse code engineer techniques? I came on pyobfuscate but I
would like more suggestions and guide to achieve the most possible
security in this matter.
The best possible security is to examine and change the threat model.

Why are you treating the code recipient as the bad guy? In other
words, why do you care whether the recipient reverse engineers the
program? Whatever effort you put into obfuscation, you can't prevent
even a mildly interested attacker from reverse engineering a program
they have in their posession.

--
\ "Laugh and the world laughs with you; snore and you sleep |
`\ alone." -- Anonymous |
_o__) |
Ben Finney
Aug 8 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

13
3568
by: Brad Tilley | last post by:
A friend of mine wrote an algorithm that generates strings. He says that it's impossible to figure out exactly how the algorithm works. That may be true, but I think if I had enough sample strings that I could write a program to identify patterns in the strings and then produce strings with similar patterns. He disagrees with me. He gave me...
0
1219
by: Aggarwal, Vikas (OFT) | last post by:
Hi all, I want to try reverese engineering a Server written in Python. Its is all object oriented stuff with some use of Design patterns. Umbrello in Linux has no support for python. I am not sure if Rational Rose can do this for me (Linux Eval version). Does any one know UML tool which can reverse engineer python classes into UML and...
8
675
by: xiao zhang yu | last post by:
me was sorry if this question are present before DotNet, no matter VB.Net or C# all they are compiled to IL, and yes, that IL will totally same as "open-sourse", every IL will easy to decompile and get the source nicety, although there have comeout with some "obfuscators" solution, but the structure still remain exactly same as the source...
7
5145
by: Martin | last post by:
Hi, I am trying to reverse engineer some software in C. Ideally I would like to use a free program that would scan for function calls and map the route of function calls in programs in a tree structure. ie. main() defined in a.c | ----------------> init_comms() defined in b.c
2
1964
by: seash | last post by:
H I developed an windows form application(visual c#), i want to protect it against copying(only licensed should be able to use) and i heard a topic like reverse engineering(c# decompilers) etc...Is there any free code available on net ---need hel ----seash
15
5061
by: Fady Anwar | last post by:
Hi while browsing the net i noticed that there is sites publishing some software that claim that it can decompile .net applications i didn't bleave it in fact but after trying it i was surprised that i could retrieve my code from my applications after i compile it so i need to know to prevent this from happening to my applications Thanx in...
2
4249
by: mary | last post by:
Hi, for my thesis at the university I'm working on a Visual c++ 6.0 source code, to understand better it I need to extract the UML graphics: Class Diagram, Object Diagram, Use Case Diagram, State Diagram, Sequence Diagram, Collaboration Diagram, Activity Diagram. I've installed Visio 2003 and I'm trying to reverse engineering my project to...
6
7371
by: Herby | last post by:
Hi, Im interested in Reverse Engineering C++ source code into a form more comprehensible than the source itself. I want to write a basic one myself, obviously i need to write a parser for the source code. Although this has some overlap with say a compiler it would also seem significantly different too.
7
5326
by: Gui | last post by:
Hi folks, I have unpacked an all-in-one exe produced by InstallShield. I've made the necessary changes and now I'm ready to repack the files. How can I do that? Which program should I use? For unpacking I used IsXunpack. But which one should I use to repack the files into an all-in-one exe again? Maybe I should use InstallShield...
0
7918
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
7843
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
8206
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
8340
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
0
6621
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
0
5392
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3840
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3875
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
1452
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.