glaubermagal / evilurlLinks
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆44Updated 2 months ago
Alternatives and similar repositories for evilurl
Users that are interested in evilurl are comparing it to the libraries listed below
Sorting:
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 2 months ago
- Protection against HTML smuggling attacks.☆99Updated 3 months ago
- BlueSky OSINT Tool☆14Updated 10 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 5 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆129Updated 6 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Updated 11 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated 2 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Updated 2 months ago
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- ☆22Updated 7 months ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 7 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆183Updated 8 months ago
- Autonomous AI C2☆32Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆36Updated 9 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionals☆105Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆40Updated 8 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆251Updated this week
- Create honeypots for cloud environments☆99Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆96Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆162Updated 2 months ago