You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you! I used your software to decode it, and now I have several .pyd files. Could you please advise me on how to proceed in identifying and working towards retrieving the source code? Currently, I only have a collection of .pyd files.
[+] Processing ../marktplaats.exe
[+] File type: PE
[+] Payload size: 20523272 bytes
[+] Payload compression: true
[+] Beginning extraction...
[+] Total files: 673
[+] Successfully extracted to __/marktplaats.exe_extracted
The text was updated successfully, but these errors were encountered:
Pyd files are compiled Python extension modules. Unfortunately it isn't possible to retrieve the source code by the usual means like decompilation as there is no Python bytecode in pyd files. Pyd files are like any other natively compiled executable. You can load a pyd file in Ghidra/IDA to have a look at the assembly code. The usual techniques to reverse engineer natively compiled executables apply here.
Thank you! I used your software to decode it, and now I have several .pyd files. Could you please advise me on how to proceed in identifying and working towards retrieving the source code? Currently, I only have a collection of .pyd files.
The text was updated successfully, but these errors were encountered: