jsunpack-n Logo

jsunpack-n

0
Free
Visit Website

jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.

FEATURES

ALTERNATIVES

Orchestration toolchain for scanning source code and infrastructure IaC against security risks.

A tool to conduct preliminary security checks in code, infrastructure, or IAM configurations using various open-source tools.

A full python tool for analyzing Android files with various functionalities.

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

A lightweight web security auditing toolkit that simplifies security tasks and enhances productivity.

A comprehensive web application security testing solution that offers built-in vulnerability assessment and management, as well as integration options with popular software development tools.

The Contrast Runtime Security Platform is a suite of application security tools that integrates security into the software development lifecycle and production environments, including IAST, SAST, RASP, and SCA capabilities.

StaCoAn is a cross-platform tool for static code analysis on mobile applications, emphasizing the identification of security vulnerabilities.