palant / jsdeobfuscator
DEPRECATED: Firefox extension that shows you what JavaScript code runs on a web page, even if it is obfuscated and generated on the fly. Simply open JavaScript Deobfuscator from the Web Developer menu and watch the scripts being compiled/executed.
☆58Updated 7 years ago
Alternatives and similar repositories for jsdeobfuscator:
Users that are interested in jsdeobfuscator are comparing it to the libraries listed below
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆110Updated last year
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Updated 5 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 7 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆67Updated 11 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- ☆74Updated 11 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- ☆79Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- ☆24Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- ☆48Updated 10 years ago
- DEPRECATED - replaced with "monitor"☆122Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- ☆137Updated 6 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆52Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- ☆30Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- ☆92Updated 10 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 6 years ago