palant / jsdeobfuscatorLinks
DEPRECATED: Firefox extension that shows you what JavaScript code runs on a web page, even if it is obfuscated and generated on the fly. Simply open JavaScript Deobfuscator from the Web Developer menu and watch the scripts being compiled/executed.
☆58Updated 8 years ago
Alternatives and similar repositories for jsdeobfuscator
Users that are interested in jsdeobfuscator are comparing it to the libraries listed below
Sorting:
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 3 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Passive SSL client fingerprinting using handshake analysis.☆113Updated 8 years ago
- Automatically exported from code.google.com/p/jsunpack-n☆166Updated 10 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 7 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 8 years ago
- Official implementation of the VirusTotal API in C programming language☆114Updated 2 years ago
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆109Updated last year
- Samsung Remote Code Execution as System User☆126Updated 9 years ago
- ☆22Updated 6 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Offline debugger for malware's reverse engineering☆116Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Updated 9 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆53Updated 7 years ago
- Public release of the RetroScope Android memory forensics framework☆119Updated 5 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆394Updated 11 years ago
- Automatically exported from code.google.com/p/ospy☆98Updated 10 years ago
- Some kernel exploit i wrote☆75Updated 10 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated this week
- X-Ray allows you to scan your Android device for security vulnerabilities that put your device at risk.☆121Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- CVE-2014-3153 aka towelroot☆120Updated 8 years ago
- system scanner☆219Updated 3 years ago
- ☆31Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- A Libemu Cython wrapper☆127Updated 2 years ago
- hashkill password recovery tool☆197Updated 11 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago