Spaces:
Running
Running
Update app.py
Browse files
app.py
CHANGED
@@ -24,7 +24,7 @@ This tool performs reverse engineering on executables (.exe/.dll) to show their
|
|
24 |
try:
|
25 |
with st.spinner("Setting up reverse engineering environment..."):
|
26 |
# Install key analysis libraries
|
27 |
-
subprocess.run(["pip", "install", "
|
28 |
subprocess.run(["pip", "install", "uncompyle6"], capture_output=True)
|
29 |
subprocess.run(["pip", "install", "capstone"], capture_output=True)
|
30 |
subprocess.run(["pip", "install", "r2pipe"], capture_output=True)
|
|
|
24 |
try:
|
25 |
with st.spinner("Setting up reverse engineering environment..."):
|
26 |
# Install key analysis libraries
|
27 |
+
subprocess.run(["pip", "install", "pyinstaller-extractor"], capture_output=True)
|
28 |
subprocess.run(["pip", "install", "uncompyle6"], capture_output=True)
|
29 |
subprocess.run(["pip", "install", "capstone"], capture_output=True)
|
30 |
subprocess.run(["pip", "install", "r2pipe"], capture_output=True)
|