A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recognizing and mitigating homograph attacks.
☆30Mar 9, 2026Updated 2 months ago
Alternatives and similar repositories for PhishiUrl
Users that are interested in PhishiUrl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Projects For The Finite Element Method Lesson And The Exercise Answers.☆11Dec 15, 2024Updated last year
- Hand Tracker Project by Python and Arduino Board☆12Dec 15, 2024Updated last year
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆108Jan 1, 2025Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆17Dec 6, 2024Updated last year
- ☆23Jul 24, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🔎 Answering Some Question About selfdestruct()☆12Jul 7, 2024Updated last year
- CTF Writeups☆28Aug 15, 2024Updated last year
- ☆31Jul 26, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆34Sep 15, 2024Updated last year
- ☆19Sep 2, 2024Updated last year
- Red team Interview Questions☆759Apr 11, 2025Updated last year
- Rocket News is a Compose Multiplatform (CMP) application that aggregates daily space-related news from APIs such as NASA, SpaceX, and Spa…☆12Apr 21, 2024Updated 2 years ago
- Simple Python Script for Tracking Bug Bounty Programs.☆39May 8, 2023Updated 3 years ago
- fAllParams is a powerful tool for extracting all parameters from given URLs.☆33Jul 7, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆38Jan 17, 2024Updated 2 years ago
- ☆33Apr 28, 2025Updated last year
- 🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.☆54May 14, 2023Updated 2 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Application to understand narrow recon☆22Feb 18, 2025Updated last year
- A tool for extract Endpoints, URLs and Secrets from contents☆66Apr 5, 2026Updated last month
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆42Oct 18, 2022Updated 3 years ago
- A Bind9 server for pentesters to use for Out-of-Band vulnerabilities☆26Dec 23, 2023Updated 2 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 10 months ago
- some cheat sheet for bash & etc.☆14Jul 18, 2023Updated 2 years ago
- 整理容器逃逸相关的漏洞和exploits.☆15Apr 17, 2024Updated 2 years ago
- Get some useful data from Clouds for your targets☆20May 3, 2026Updated last week
- ☆13Aug 22, 2025Updated 8 months ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆50May 18, 2025Updated 11 months ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ✂️ Removing CDN IPs from the list of IP addresses☆346Jul 22, 2025Updated 9 months ago
- Uniform Resource Identifier (URI) parser in Julia☆17Mar 11, 2021Updated 5 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year