jsunpack-n Logo

jsunpack-n

0
Free
Visit Website

jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.

FEATURES

ALTERNATIVES

ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.

Dynamic Java code instrumentation kit for Android applications.

A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.

A comprehensive application security platform combining specialized services and software tools to help organizations manage vulnerabilities throughout the software development lifecycle.

A tool for brute-forcing GET and POST parameters to discover potential vulnerabilities in web applications.

Python-based web server framework for setting up fake web servers and services with precise data responses.

Static application security testing (SAST) tool for scanning source code against security and privacy risks.

A lightweight web application firewall that protects modern applications and APIs across distributed architectures with integrated DoS protection, bot defense, and DevOps-friendly deployment options.

PINNED