Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of reverse engineering Python binaries in this 29-minute PyCon US talk by Josh Wiedemeier. Delve into the world of Python bytecode (.pyc) files and learn how to interpret and decompile them manually using a simple example. Discover the techniques used by companies and malware authors to distribute products and payloads as bytecode, believing their logic to be unreadable. Gain insights into the challenges and solutions for automating Python decompilation. Aimed at curious intermediate Python developers and reverse engineers, this presentation offers a unique perspective on recovering Python source code from bytecode, distinguishing itself from previous bytecode-oriented talks that focus primarily on Python's execution model. Access the accompanying slides for a comprehensive visual guide to the concepts discussed.