Skip to content

EXTENDED_ ARG instruction not supported #9

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
hasikill opened this issue Aug 22, 2021 · 5 comments
Open

EXTENDED_ ARG instruction not supported #9

hasikill opened this issue Aug 22, 2021 · 5 comments

Comments

@hasikill
Copy link

Exception: EXTENDED_ARG not yet implemented

@abel1502
Copy link

Duplicate of #2.

Brielfy: I've fixed it here, but those changes weren't yet incorporated into the original repo

@AGPonomarev
Copy link

Duplicate of #2.

Brielfy: I've fixed it here, but those changes weren't yet incorporated into the original repo

Hello, did you manage to unpack the mod WoT?

@abel1502
Copy link

Duplicate of #2.
Brielfy: I've fixed it here, but those changes weren't yet incorporated into the original repo

Hello, did you manage to unpack the mod WoT?

I actually found out that I had been dealing with a combined use of several obfuscators, so this tool wasn't sufficient. I ended up extracting the mod from the imported modules cache directly, via another mod

@AGPonomarev
Copy link

I ended up extracting the mod from the imported modules cache directly, via another mod

Is there a guide or article on how to do this?

@abel1502
Copy link

abel1502 commented Mar 29, 2022

I ended up extracting the mod from the imported modules cache directly, via another mod

Is there a guide or article on how to do this?

Nope, I don't think there is. At least I don't know of one. I just experimented with what I can get from inside the same pyton interpreter as the mod. If you'd like to have a go at this yourself, good points to get started at are sys.modules and gc.get_objects(). Another strategy is to overwrite some library functions/classes and then go up the traceback via inspect's methods. I'm sorry, but I don't have spare time in the foreseeable future to get into greater details or write a tutorial, but I had some plans to encapsulate it into some sort of toolkit. Don't expect it to be soon neither, though

UPD: Also, I just came up with another idea of using sys.addaudithook() for this cause. It might actually be the simplest one, now that I think of it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants