Python Code Obfuscation [closed]

Solution 1:

Your problem space is underspecified. Is this for a command-line app? Is this code supposed to be used as a library?

In addition to the two other answers, you could embed the code into a binary. When it starts, decode the code and eval the string. This works for a shared library extension as well. You could also do that with byte code, I think, but it wouldn't be as simple as calling Py_EvalCode.

py2exe or freeze are other solution, which convert the code into an executable. It just includes the code in the binary, and doesn't do any sort of serious obsfucation, but it's still harder than opening a .py file.

You could write the code in Cython, which is similar to Python and writes Python extension files in C, for use as a .so. That's perhaps the hardest of these to reverse engineer and still give you a high-level language for develoment.

They are all hackable, as are all solutions. How hard to you want it to be?

Solution 2:

http://www.lysator.liu.se/~astrand/projects/pyobfuscate/

Or at http://freshmeat.net/projects/pyobfuscate/

Solution 3:

I actually found a very nice project which basically converts a Python to C++ and create a binary, statically linked file.

Check this out: http://www.nuitka.net/

Solution 4:

In many situations you can ship byte-compiled .pyc files instead of the .py source files. This gives you some level of obfuscation. As the pyobfuscate README suggests, this has limitations. But you may be able to combine the two approaches.

Solution 5:

Python's standard library includes compileall.py. You can run this on a directory and it will generate .pyc files for all your source files. The .pyc files will only include bytecode and docstrings, and will strip out all comments. You could then copy this directory, and then run something like rm -rf $(find . -name .py) to remove the original source files.