November 14, 2025Nov 14 Author 2 hours ago, sa6 said:can anyone bulid the exe pleaseI don't know how to create exe with PyInstaller.Also I didn't finished my updates yet.
November 14, 2025Nov 14 2 hours ago, CodeExplorer said:I don't know how to create exe with PyInstaller.git clone https://github.com/ergrelet/unlicense.gitcd unlicense### Replace the necessary files with your updatespip install --upgrade pippip install .pip install pyinstallerpyinstaller unlicense.spec
November 15, 2025Nov 15 On 11/14/2025 at 10:29 AM, CodeExplorer said:I don't know how to create exe with PyInstaller.Also I didn't finished my updates yet.drop bombs
November 17, 2025Nov 17 Here compiled unlicense with codeexplorer's fixes:unlicense compiledWith pyton 3.09 and 3.11 versions.
Thursday at 12:23 PM2 days On 11/9/2025 at 1:19 AM, InvizCustos said:This is a very bad thing to add!Grabbing this personal information from a user without mentioning that is a terrible act to do !!Now you have ip @ of @CodeExplorer did you ask him if he agreed to that or not?? No! So that's why everyone must run any garbage from the internet on an isolated machine!
Thursday at 10:42 PM2 days 10 hours ago, X0rby said:This is a very bad thing to add!Grabbing this personal information from a user without mentioning that is a terrible act to do !!Now you have ip @ of @CodeExplorer did you ask him if he agreed to that or not?? No! So that's why everyone must run any garbage from the internet on an isolated machine!This forum is devoted to reverse engineering. This implies by default that all unknown executable files should be run in a virtual environment. Moreover, I clearly positioned the provided sample as an object for researching non-standard Themida settings and in no way encouraged its launch on the host machine. In any case, the application does not do anything illegal, and the license server stores the minimum necessary information, which under no circumstances is transferred to third parties and is not used for anything other than collecting statistics on the use of the application. Edited Thursday at 10:44 PM2 days by InvizCustos
Thursday at 11:19 PM2 days 34 minutes ago, InvizCustos said:This forum is devoted to reverse engineering. This implies by default that all unknown executable files should be run in a virtual environment. Moreover, I clearly positioned the provided sample as an object for researching non-standard Themida settings and in no way encouraged its launch on the host machine. In any case, the application does not do anything illegal, and the license server stores the minimum necessary information, which under no circumstances is transferred to third parties and is not used for anything other than collecting statistics on the use of the application.That’s a weak excuse.“Reverse engineering forum” is not a reason to steal personal data. Running unknown binaries in a VM is indeed a good practice, not a license for you to silently collect IPs or any identifying info without disclosure.The problem isn’t whether it’s legal, it’s that you did not inform the user, If your app contacts a license server and logs IPs that must be stated explicitly ! Saying “it only collects minimal data” after the fact doesn’t change anything. Consent is obtained before, not justified after and “statistics” doesn’t magically make undisclosed data collection acceptable.Reverse engineering is about analyzing protections and behavior not normalizing shady practices and then hiding behind assumptions.
Friday at 08:04 AM1 day 8 hours ago, X0rby said:That’s a weak excuse.“Reverse engineering forum” is not a reason to steal personal data. Running unknown binaries in a VM is indeed a good practice, not a license for you to silently collect IPs or any identifying info without disclosure.The problem isn’t whether it’s legal, it’s that you did not inform the user, If your app contacts a license server and logs IPs that must be stated explicitly ! Saying “it only collects minimal data” after the fact doesn’t change anything. Consent is obtained before, not justified after and “statistics” doesn’t magically make undisclosed data collection acceptable.Reverse engineering is about analyzing protections and behavior not normalizing shady practices and then hiding behind assumptions.Excuse? I wasn't even going to make excuses, especially to random forum users. I'm not interested in the opinions of random people.It's just amusing how you try to make a problem out of nothing. Every website stores the IP addresses of users who visit it in its access logs without even informing the user about it. Even this forum ;)
Friday at 01:02 PM1 day 4 hours ago, InvizCustos said:Excuse? I wasn't even going to make excuses, especially to random forum users. I'm not interested in the opinions of random people.It's just amusing how you try to make a problem out of nothing. Every website stores the IP addresses of users who visit it in its access logs without even informing the user about it. Even this forum ;)If you don’t care about “random forum users”, then don’t publish things publicly. You posted it here on purpose, so a public post means public criticism. You don’t get to choose who is allowed to comment... The website example is bullshit. A website logging IPs during an HTTP request is not the same as an executable secretly making outbound connections. The protocol forces one; the other is a decision you coded yourself. Acting like they’re the same is dishonest. Running a program does not mean permission for hidden network activity. Edited Friday at 01:05 PM1 day by X0rby
Create an account or sign in to comment