glaubermagal / evilurl
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆33Updated this week
Related projects ⓘ
Alternatives and complementary repositories for evilurl
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆46Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- Basic protection against HTML smuggling attempts.☆43Updated this week
- Security tool against dependency typosquatting attacks☆34Updated this week
- Modular web-application honeypot platform built using go and gin☆54Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆87Updated last week
- ☆28Updated 3 months ago
- Tool for obfuscating and deobfuscating data.☆64Updated 8 months ago
- God Mode Detection Rules☆131Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆77Updated 3 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- Canary Detection☆161Updated 7 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆96Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆161Updated 5 months ago
- Stalker, the Extensible Attack Surface Management tool.☆79Updated this week
- Living Off Security Tools☆41Updated 3 weeks ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆43Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆107Updated 2 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆44Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- Nuclei plugins to audit Chrome extensions☆64Updated 4 months ago
- A Pentest Collaboration and Reporting Tool☆50Updated this week
- Daily updates from leaked data search engines and aggregators☆86Updated last week
- a hackbot proof-of-concept☆34Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man ’s SOC.☆49Updated last month
- Identify hardcoded secrets in static structured text (version 2)☆87Updated last week
- Service that scans your Infrastructure as Code for common vulnerabilities☆46Updated 11 months ago