Reverse Engineering Application Protected with Pyarmor
Study case pyarmor obfuscation on windows, linux, and macos environment
Preface
Approaches
Technique
Study Case
Stomping Python Builtin Function
Study Case: TFCCTF 2024 - McKnight
from pytransform import pyarmor_runtime
pyarmor_runtime()
__pyarmor__(__name__, __file__, <DATA>)










Study Case: BlackHat MEA 2023 - Can you break the armor?






Further Exploration #1

Further Exploration #2
Injecting Python Code during Runtime
Study Case: Flare-On 9 - Challenge 11, Utilizing PyInjector (Windows)
Study Case: XXXXX, Utilizing PyInjector (Linux)
Study Case: XXXXX, Utilizing PyInjector (MacOS x64)
Study Case: XXXXX, Utilizing PyInjector (MacOS aarch64)
Modifying Python Executable
Study Case: TFCCTF 2024 - McKnight, Dumping Object Code
Study Case: TFCCTF 2024 - McKnight, Tracing OP_CODE
Conclusion
References
Last updated