jsunpack-n Logo

jsunpack-n

0
Free
Visit Website

jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.

FEATURES

ALTERNATIVES

Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.

A serverless application that demonstrates common serverless security flaws and weaknesses

A CSP plugin for hapi with per-route configuration options.

Mitigate security concerns of Dependency Confusion supply chain security risks.

Arnica is an application security platform that offers real-time scanning, risk mitigation, and management across various aspects of the software development lifecycle.

A web security tool that scans for vulnerabilities and known attacks.

This article discusses the different types of remote timing attacks and provides defense strategies against them.

A tool for dynamic analysis of mobile applications in a controlled environment.