DimaReverse

Nuitka Static Unpacker — a static-first research tool for analyzing Nuitka-compiled binaries (constants/module extraction, .pyc recovery, reports).

44
4
69% credibility
Found Apr 26, 2026 at 44 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A pure Python tool for statically analyzing authorized Nuitka-compiled binaries to extract modules, constants, bytecode, and metadata for security research, malware analysis, and reverse engineering.

How It Works

1
🔍 Discover the Helper

You hear about a simple tool that helps peek inside compiled programs you're allowed to check, like for security or research.

2
📥 Get It Ready

Download the files to your computer and set up the basic helpers it needs, just like installing a simple app.

3
🗂️ Pick Your File

Choose the program file you own or have permission to inspect, like a suspicious executable from your security work.

4
🚀 Start the Peek

Run the quick list to see all the hidden parts inside, or go for a full unpack—it feels fast and straightforward.

5
Choose Your Depth
👀
Quick List

See a simple list of inner pieces in seconds to pick what interests you.

🔬
Full Unpack

Dive deeper to pull out reports, hidden data, and even ready-to-use bundles.

6
Wait and Watch

Give it a moment to work its magic, and it shows progress as it uncovers the secrets.

🎉 See the Insights

Enjoy clear reports, lists of hidden modules, extracted goodies, and tools for rebuilding—now you understand what's really inside!

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 44 to 44 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is nuitka-static-unpacker?

Nuitka-static-unpacker is a Python tool on GitHub for statically analyzing Nuitka-compiled binaries, pulling out constants, module structures, and .pyc bytecode from nuitka static builds or nuitka commercial github releases. It solves the pain of reverse-engineering nuitka static binaries by generating JSON reports, secrets scans, and AI-ready bundles for reconstructing Python code from nuitka-compiled exes or DLLs. Run it via CLI on authorized targets to get fast module lists and extractions without dynamic debugging.

Why is it gaining traction?

Unlike basic nuitka extractor github scripts, it handles nuitka commercial data-hiding statically, supports Nuitka 1.x to 4.0, and offers quick module listing in seconds plus focused decomp on specific packages with --only flags. Developers dig the NBC output for LLM-assisted source rebuilds and the companion unpackers for onefile or Themida-wrapped nuitka static linking targets. It's a practical nuitka helper github drop-in for python nuitka github workflows, skipping full decomp overhead.

Who should use this?

Malware analysts triaging Nuitka-packed samples for constants/module extraction, security auditors scanning authorized nuitka static libpython builds for hardcoded tokens, and CTF reversers recovering .pyc from challenges. Reverse engineers verifying nuitka static compile regressions or prepping Ghidra imports will save hours with its reports and fast triage.

Verdict

Grab it if you're deep in Nuitka reversing—solid for research despite 44 stars and 0.7% credibility score; docs are thorough but test coverage feels light for production. Pair with external decompilers for best results on real binaries.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.