# objects.js > Emulate common browser and PDF viewer objects, methods, and properties when deobfuscating JavaScript. **Category:** [[categories/dynamically-reverse-engineer-code-scripts|Dynamically Reverse-Engineer Code > Scripts]] | **Tier:** Standard (docs) **Docs:** [https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/scripts](https://docs.remnux.org/discover-the-tools/dynamically+reverse-engineer+code/scripts) ## Related Tools - [[tools/box-js|box-js]] — JavaScript sandbox for analyzing malicious scripts by emulat - [[tools/jstillery|jstillery]] — Deobfuscate JavaScript scripts using AST and Partial Evaluat - [[tools/powershell|powershell]] — Run PowerShell scripts and commands. - [[tools/spidermonkey|SpiderMonkey]] — Mozilla JavaScript engine — execute and deobfuscate maliciou #dynamically-reverse-engineer-code-scripts