0p4n1k

0p4n1k / Noctyra

Public

A generic static python deobfuscator

13
0
100% credibility
Found Mar 31, 2026 at 13 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

Noctyra is a tool that analyzes and simplifies complex or obfuscated Python code, making it more readable by resolving constants, decoding patterns, and unrolling dynamic parts.

How It Works

1
🔍 Discover Noctyra

You come across a handy tool that turns tangled, hidden code into simple, readable versions.

2
📦 Get it ready

Follow easy setup steps to prepare the tool on your computer so it's all set to use.

3
📁 Choose your file

Select the confusing Python code file you want to make clearer and easier to understand.

4
Simplify the code

Let the tool work its magic, unraveling tricks, decoding secrets, and straightening out the mess.

5
📄 View the clean version

Open the new file to see straightforward code that's now easy to follow.

Code makes sense

Celebrate as you finally understand what the original code was really doing without all the confusion.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 13 to 13 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Noctyra?

Noctyra is a Python tool for deobfuskating static Python code, turning messy, encoded scripts into clean, readable versions. It processes input files via a simple CLI—`python main.py input.py --output out.py`—running automatic passes to resolve constants, decode base64/zlib/gzip patterns, unroll exec calls, simplify conditions, and expand list comprehensions. Developers get formatted output ready for analysis, tackling the doom of generic GitHub repos buried in obfuscated payloads.

Why is it gaining traction?

It stands out as a generic static deobfuscator with a pluggable pipeline that auto-detects iteration needs up to 100 passes, plus debug logging for transparency. Unlike basic tools, it safely evaluates expressions with resource limits, handling common obfuscation tricks without full execution risks. The uv-based setup and Black formatting make it drop-in ready, appealing to those scanning generic packages or webhook triggers on GitHub.

Who should use this?

Security analysts reverse-engineering obfuscated Python malware or scripts from generic GitHub accounts. Malware researchers dealing with encoded payloads in threat intel feeds. Pentesters cleaning up dynamic code from CTFs or red-team drops.

Verdict

Experimental with just 13 stars and 1.0% credibility score—docs are solid with a demo GIF and Makefile for tests/linting, but low adoption signals immaturity; test in a sandbox first. Worth a spin for targeted deobfuscation if you're tired of manual decoding.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.