jsunpack-n Logo

jsunpack-n

Emulates browser functionality to detect exploits targeting browser vulnerabilities.

165
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

jsunpack-n Description

jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.

jsunpack-n FAQ

Common questions about jsunpack-n including features, pricing, alternatives, and user reviews.

jsunpack-n is Emulates browser functionality to detect exploits targeting browser vulnerabilities.. It is a Security Operations solution designed to help security teams with Browser Security, File Analysis.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

HexPrism Logo

HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.

0
ChromeFreak Logo

A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.

0
IE10Analyzer Logo

IE10Analyzer can parse and recover records from WebCacheV01.dat, providing detailed information and conversion capabilities.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox