Axero Intranet is an award-winning intranet and employee experience platform.
Hundreds of companies and millions of employees use Axero’s intranet software to communicate, collaborate, manage tasks and events, organize content, and develop their company culture.
Learn More
Endpoint Protection Software for Businesses | HYPERSECURE
DriveLock protects systems, data, end devices from data loss and misuse.
The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
Extract contents of a Windows executable file created by pyinstaller
MIGRATED TO GITHUB
https://github.com/extremecoders-re/pyinstxtractor
This is a pythonscript to extract the contents of a PyInstaller generated Windows executable file.
The contents of the pyz file (usually pyc files) present inside the executable are also extracted.
The pyc files are made valid so that a python bytecode decompiler will recognise it.
Script can run on both python 2.x and 3.x
Pyinstaller versions 2.0, 2.1, 3.0, 3.1 and 3.2 are supported
Decompiler for setups creates with the Nullsoft Installer
...Generally 7-zip opens NSI[exe] files - since 9.33 [2014-06-15] there should be additionally the file [NSIS].nsi inside, that is the decompiled setup script.
Attention this NSIS decompilation was disabled in 7z 15.06.
So last version that officially **supports NSIS Script decompilation** is 7z **15.05**
https://sourceforge.net/projects/sevenzip/files/7-Zip/15.05/ (2015-06-15)
-> 7-zip 15.10 no longer decompiles NSIS script
http://bit.do/7zNoMoreNSIS
^-however doing a private build you may get it back(more details in the post).