jsunpack-n
Emulates browser functionality to detect exploits targeting browser vulnerabilities.

jsunpack-n
Emulates browser functionality to detect exploits targeting browser vulnerabilities.
jsunpack-n Description
jsunpack-n emulates browser functionality when visiting a URL to detect exploits targeting browser and browser plug-in vulnerabilities. It accepts various inputs like PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can utilize the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additional decoded URLs or paths can be fetched using the '-a' option. In case of no output, use '-v' or '-V' for more information.
jsunpack-n FAQ
Common questions about jsunpack-n including features, pricing, alternatives, and user reviews.
jsunpack-n is Emulates browser functionality to detect exploits targeting browser vulnerabilities.. It is a Security Operations solution designed to help security teams with Browser Security, File Analysis.
ALTERNATIVES
A Cross-Platform Forensic Framework for Google Chrome that allows investigation of history, downloads, bookmarks, cookies, and provides a full report.
IE10Analyzer can parse and recover records from WebCacheV01.dat, providing detailed information and conversion capabilities.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox