glaubermagal / evilurlLinks
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆41Updated last month
Alternatives and similar repositories for evilurl
Users that are interested in evilurl are comparing it to the libraries listed below
Sorting:
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 2 weeks ago
- Protection against HTML smuggling attacks.☆99Updated 2 months ago
- BlueSky OSINT Tool☆14Updated 9 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆40Updated last month
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- ☆22Updated 6 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆133Updated 2 weeks ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Updated 3 weeks ago
- Web Server Vulnerability Scanning Tool☆36Updated 6 months ago
- Autonomous AI C2☆32Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆156Updated last month
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆103Updated 9 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆27Updated 3 months ago
- An archive of 0day.today exploits☆166Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Updated this week
- Hijack a slack bot to phish your way in☆56Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆253Updated 2 weeks ago
- Cyber threat intelligence tool suite.☆42Updated 5 months ago
- Living Off Security Tools☆51Updated 10 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Stalker, the Extensible Attack Surface Management tool.☆86Updated last week