Scripts
Dynamically Reverse-Engineer Code
Last updated
Dynamically Reverse-Engineer Code
Last updated
Execute and deobfuscate JavaScript using a patched version of Mozilla's standalone JavaScript engine.
Website: Author: SpiderMonkey by Mozilla Foundation, patched by Didier Stevens: License: Mozilla Public License 2.0: Notes: js-ascii, js-file State File:
Emulate common browser and PDF viewer objects, methods, and properties when deobfuscating JavaScript.
Website: Author: Lenny Zeltser License: Public Domain Notes: The file is in /usr/local/share/remnux State File:
Python3 and JavaScript interop engine, fork of the original PyV8 project
Website: Author: Area1 Security License: Apache License 2.0: State File:
Deobfuscate JavaScript scripts using AST and Partial Evaluation techniques.
Website: Author: Stefano Di Paola, Minded Security: License: GNU General Public License (GPL) v3: Notes: jstillery State File:
Analyze suspicious JavaScript scripts.
Execute and deobfuscate JavaScript using Mozilla's standalone JavaScript engine.
GUI JavaScript debugger
Run PowerShell scripts and commands.
Website: Author: CapacitorSet License: MIT License: Notes: box-js, box-export State File:
Website: Author: Mozilla Foundation License: Mozilla Public License 2.0: Notes: js State File:
Website: Author: Mozilla Project License: Mozilla Public License v2.0: Notes: rhino-debugger State File:
Website: Author: Microsoft Corporation License: MIT License: Notes: pwsh State File: