| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This presentation will explore the current state of Python source code obfuscation and introduce some new techniques for obfuscation at the bytecode level. We will examine existing solutions for obfuscating Python code and the weaknesses of them, and then take a crash course on Python internals. We'll go over a number of ways you can manipulate Python bytecode to act in unintended ways, and thoroughly break and confuse popular Python decompilers and disassemblers.
Gabe wasted the majority of his youth staring at Pokemon ROMs in hex editors. He is currently studying Computer Science at Rochester Institute of Technology where he continues to waste most of his young adulthood staring at things in hex editors.
Recorded at NolaCon 2016
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast