A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆46Aug 5, 2025Updated 7 months ago
Alternatives and similar repositories for evilurl
Users that are interested in evilurl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 8 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 6 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Security tool against dependency typosquatting attacks☆55Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆76Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.☆11Updated this week
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- My Privacy DNS #Matrix lists for blacklisting☆144Jan 4, 2026Updated 2 months ago
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆134Feb 12, 2026Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Nov 9, 2024Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆175Jan 9, 2026Updated 2 months ago
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆112Mar 23, 2026Updated last week
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆356Mar 21, 2026Updated last week
- Offline Cybersecurity Knowledge Base☆204Mar 2, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- ☆42Sep 5, 2025Updated 6 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 2 months ago
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 5 months ago
- ☆90Feb 12, 2025Updated last year
- AWS Lambda Cleaner - Cleanup resources on AWS Lambda container shutdown (timeout and/or spin-down)☆20Sep 30, 2022Updated 3 years ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated last month
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- one-stop resource for all things offensive security.☆178Feb 21, 2026Updated last month