glaubermagal / evilurlView external linksLinks
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆45Aug 5, 2025Updated 6 months ago
Alternatives and similar repositories for evilurl
Users that are interested in evilurl are comparing it to the libraries listed below
Sorting:
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 5 months ago
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.☆11Feb 8, 2026Updated last week
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Feb 7, 2026Updated last week
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 10 months ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆72Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Security tool against dependency typosquatting attacks☆54Feb 9, 2026Updated last week
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated last month
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 10 months ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 6, 2026Updated last week
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Offline Cybersecurity Knowledge Base☆200Updated this week
- NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt …☆26Feb 7, 2026Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆97Feb 5, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Jan 9, 2026Updated last month
- JPG steganography tool☆64Jan 9, 2026Updated last month
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆104Updated this week
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆131Jan 21, 2026Updated 3 weeks ago
- one-stop resource for all things offensive security.☆177Feb 3, 2026Updated last week
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated 10 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- If these strings are in your code, you might have a problem!☆50Dec 12, 2025Updated 2 months ago
- ☆39Sep 5, 2025Updated 5 months ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- ☆90Feb 12, 2025Updated last year
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆59Nov 3, 2024Updated last year
- My Privacy DNS #Matrix lists for blacklisting☆141Jan 4, 2026Updated last month
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 8 months ago