Comment on page


Dynamically Reverse-Engineer Code

SpiderMonkey (Patched)

Execute and deobfuscate JavaScript using a patched version of Mozilla's standalone JavaScript engine.
Website: Author: SpiderMonkey by Mozilla Foundation, patched by Didier Stevens: License: Mozilla Public License 2.0: Notes: js-ascii, js-file State File:


Emulate common browser and PDF viewer objects, methods, and properties when deobfuscating JavaScript.
Website: Author: Lenny Zeltser License: Public Domain Notes: The file is in /usr/local/share/remnux State File: remnux.config.objects.init


Python3 and JavaScript interop engine, fork of the original PyV8 project
Website: Author: Area1 Security License: Apache License 2.0: State File: remnux.python3-packages.stpyv8


Deobfuscate JavaScript scripts using AST and Partial Evaluation techniques.
Website: Author: Stefano Di Paola, Minded Security: License: GNU General Public License (GPL) v3: Notes: jstillery State File: remnux.node-packages.jstillery


Analyze suspicious JavaScript scripts.
Website: Author: CapacitorSet License: MIT License: Notes: box-js, box-export State File:


Execute and deobfuscate JavaScript using Mozilla's standalone JavaScript engine.

Rhino Debugger

GUI JavaScript debugger
Website: Author: Mozilla Project License: Mozilla Public License v2.0: Notes: rhino-debugger State File: remnux.packages.rhino

PowerShell Core

Run PowerShell scripts and commands.
Website: Author: Microsoft Corporation License: MIT License: Notes: pwsh State File: remnux.packages.powershell
Last modified 2yr ago