jsunpack-n Logo

jsunpack-n

0
Free
Visit Website

jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.

FEATURES

ALTERNATIVES

A tool for automated HTTP header injection

The Contrast Runtime Security Platform is a suite of application security tools that integrates security into the software development lifecycle and production environments, including IAST, SAST, RASP, and SCA capabilities.

Scanning APK file for URIs, endpoints & secrets.

A security analysis platform that combines SAST, SCA, SBOM generation and AI-assisted remediation to detect and fix vulnerabilities during the software development lifecycle.

A free online tool to scan for DOM-based XSS vulnerabilities in HTML, JavaScript, and CSS files.

SAST and malware analysis tool for Android APKs with detailed scan information.

A PHP/MySQL web application designed to aid security professionals in testing their skills and tools in a legal environment.

An API security platform that combines discovery, compliance monitoring, and protection capabilities to defend against API attacks, automated threats, and data exposure.