
jsunpack-n
#Application Protection#Application Security
A security feature to prevent unexpected manipulation of fetched resources.
jsunpack-n Emulates Browser Functionality When Visiting a URL
jsunpack-n emulates the functionality of a browser when it visits a URL. This allows it to detect exploits that target vulnerabilities in both the browser and its plug-ins.
Supported Input Formats and Usage Instructions
It accepts various input formats including PDF files, Packet Captures, HTML, JavaScript, and SWF files. Users can access the online version at http://jsunpack.jeek.org/ to upload files or enter script contents and URLs for decoding. To run jsunpack-n locally, use the command './jsunpackn.py -u URL' to fetch and decode a URL, or './jsunpackn.py samples/sample-pdf.file' to decode a local file. Additionally, more decoded URLs or paths can be retrieved using the '-a' option. If there is no output, you can use '-v' or '-V' to get more detailed information.