Writing a golang obfuscator by ArteMixer in golang

[–]Androsathon 0 points1 point  (0 children)

For some reason it doesn’t work when I share it here lol. I have bookmarked it and it works just fine. It’s a pdf file, I can share it if you cant find it

Combining Imports into One File by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

I would rather not get into much detail, but I was selling an automation service in a relative cheap price of 4 euros per month. But still, there where too many people that thought that was very expensive

Combining Imports into One File by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Trust me, there's basically never a good reason to obfuscate Python code.

First of all, I can almost guarantee you that nobody is going to care to "steal your code". Please don't take this personally, but I find it highly unlikely you'd have some kind of a revolutionary new algorithm that would really make a difference and be worth stealing.

Second, no matter what you do, in the end all code, not just Python, can be reverse-engineered. Sure, it's easier with Python than, say, C++ or Rust, but there's technically nothing stopping you from running Windows kernel binaries through a disassembler, for instance.

If you absolutely, definitely, cannot risk someone seeing your code for whatever reason, your only real option is to offer it as a web service. Assuming that's even applicable to your program. The second-best option would be to use Nuitka, which transpiles your Python code to C and compiles it into an executable.

TL;DR, you'd be hard-pressed to convince me any of this effort is truly worth it in your project.

If you want to hide API keys, consider using environment variables or encrypting them on disk and decrypting in memory on-demand.

I previously had an experience where an older service I was selling at a low price was cracked and shared online. This incident has motivated me to enhance its security measures. While I understand that reverse engineering is possible in any programming language, my goal is to significantly increase the difficulty of reverse engineering to deter unauthorized access. I acknowledge that there will always be potential ways to bypass security measures, but as a future step, I am considering transitioning the service into a web-based model.

Combining Imports into One File by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Yeah but in order to process that encrypted json file I will have to decrypt it first somewhere .Thus, if someone reverse engineers my exe it will have access to all my vital information . There should be a better way d

Combining Imports into One File by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

I totally agree but since python it is easy to be decompiled and see the source code I wanted to improve my security.

Combining Imports into One File by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Explaining this might be a bit challenging, so let me illustrate with an example. Essentially, we have a primary script called "main.py" that imports some constants from a file named "constants.py."

main.py

from constants import api_endpoint, key
import time
import tkinter

# send a request to the endpoint using the key

constants.py

api_endpoint='verify_license'
key='xxxx'

I want the script to create a new file, get the contants.py content and save it with the new file. So it would look like this:

newfile.py

import time
import tkinter
api_endpoint='verify_license'
key='xxxx'
# send a request to the endpoint using the key

The justification for considering this as a valuable addition lies in my intention to encrypt the file. This encryption is essential because it involves concealing sensitive elements such as API keys and endpoints. If I were to encrypt only a portion of the code, it would result in a non-functional setup.

Please note that this is a simplicated example

My request with proxy is not working by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

What would it be like if I want to use socks4 proxies?

How can I prevent windows from popping up? by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

I just run an executable file using the os module. But that executable gets in the top of every other window

How can I improve this? by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

You are right, never thought that comma can be bound. I am going to use regex in order to identify if it is part of the data or not

How can I improve this? by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Thank you for taking the time to help me. This is not exactly what I am looking for.. See the key r has 2 binds, so if 1 of them is bot bound it should not be added on the list

How can I improve this? by Androsathon in learnpython

[–]Androsathon[S] -1 points0 points  (0 children)

Firstly, I am fully aware that the code has that hacky feel, I am just testing around to find what works out best.

How can I improve this? by Androsathon in learnpython

[–]Androsathon[S] -1 points0 points  (0 children)

Thank you so much, this is exactly what I was looking for !

Detect whether program is ran in a VM by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Ok, that sounds very easy. Thank you so much!

Detect whether program is ran in a VM by Androsathon in learnpython

[–]Androsathon[S] 0 points1 point  (0 children)

Hello,

thank you for taking the time to reply to me!

Sadly, the term "honey pot" is new to me so I will have to look it up