UndeadSec / checkURLLinks
Detect evil urls that uses IDN Homograph Attack.
☆205Updated 7 years ago
Alternatives and similar repositories for checkURL
Users that are interested in checkURL are comparing it to the libraries listed below
Sorting:
- Python wordlist generator☆176Updated 3 years ago
- A Hackers framework☆164Updated 8 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆53Updated 8 years ago
- rang3r | Multi Thread IP + Port Scanner☆122Updated 2 years ago
- There are three ways to create an email bomb Mass mailing☆66Updated 3 years ago
- A tool that finds and scan sites for sql injection vulnerability☆163Updated 6 years ago
- Information Gathering Tool☆57Updated 2 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆191Updated 7 years ago
- PhishX - The Complete Spear Phishing Tool☆109Updated 7 years ago
- A Python Script to find admin panel of a site☆179Updated 3 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- Automated Payload Generator Tool☆109Updated 5 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆96Updated 5 years ago
- smb scanner is the transport protocol.smb operates over TCp ports 139 and 445.☆66Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV I…☆148Updated 5 years ago
- Advanced MSF Payload Generator tool for Linux☆101Updated 9 months ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆106Updated 3 years ago
- wifisky Python script for pentesting wireless networks☆102Updated 6 years ago
- Tool to check if an app is installed on the target device through a link☆117Updated 5 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆88Updated 7 years ago
- Using open Adb ports we can exploit a devive☆99Updated 4 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated 2 years ago
- Toolkit Hacking☆70Updated 2 years ago
- Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standa…☆67Updated 6 years ago
- Python Script to help/automate the WiFi hacking exercises.☆87Updated 4 years ago
- Hash cracker with auto detect hash☆248Updated 2 months ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆48Updated 4 years ago