glaubermagal / evilurl
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆36Updated 3 months ago
Alternatives and similar repositories for evilurl:
Users that are interested in evilurl are comparing it to the libraries listed below
- Hijack a slack bot to phish your way in☆49Updated 2 months ago
- Protection against HTML smuggling attempts.☆87Updated last week
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- Living Off Security Tools☆44Updated 3 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆29Updated 3 weeks ago
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- Tool for obfuscating and deobfuscating data.☆67Updated 11 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 4 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆39Updated 11 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆78Updated 6 months ago
- a hackbot proof-of-concept☆37Updated 11 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆124Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆125Updated last month
- God Mode Detection Rules☆134Updated 6 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆48Updated 3 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- Canary Detection☆164Updated 10 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated 11 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆47Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 3 months ago