palant / jsdeobfuscator
DEPRECATED: Firefox extension that shows you what JavaScript code runs on a web page, even if it is obfuscated and generated on the fly. Simply open JavaScript Deobfuscator from the Web Developer menu and watch the scripts being compiled/executed.
☆58Updated 7 years ago
Alternatives and similar repositories for jsdeobfuscator:
Users that are interested in jsdeobfuscator are comparing it to the libraries listed below
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Updated 5 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Updated 7 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- ☆79Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- Automatically exported from code.google.com/p/ospy☆96Updated 9 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass than…☆110Updated 10 months ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 10 years ago
- The slides and exploit of mosec2016☆112Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆60Updated 5 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆67Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Static analysis tool for javascript code based. Scanjs uses Esprima to convert sources to AST, then walks AST looking for patterns.☆54Updated 10 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆393Updated 10 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- ☆48Updated 9 years ago
- ☆24Updated 9 years ago
- ☆20Updated 9 years ago
- ☆198Updated 9 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- ☆137Updated 6 years ago