Explore the intricacies of reverse engineering Python binaries in this 29-minute PyCon US talk by Josh Wiedemeier. Delve into the world of Python bytecode (.pyc) files and learn how to interpret and decompile them manually using a simple example. Discover the techniques used by companies and malware authors to distribute products and payloads as bytecode, believing their logic to be unreadable. Gain insights into the challenges and solutions for automating Python decompilation. Aimed at curious intermediate Python developers and reverse engineers, this presentation offers a unique perspective on recovering Python source code from bytecode, distinguishing itself from previous bytecode-oriented talks that focus primarily on Python's execution model. Access the accompanying slides for a comprehensive visual guide to the concepts discussed.
Overview
Syllabus
Talks - Josh Wiedemeier: There and Back Again: Reverse Engineering Python Binaries
Taught by
PyCon US