glaubermagal / evilurl
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆36Updated last month
Alternatives and similar repositories for evilurl:
Users that are interested in evilurl are comparing it to the libraries listed below
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆51Updated 2 weeks ago
- Protection against HTML smuggling attempts.☆83Updated last week
- Mapping of open-source detection rules and atomic tests.☆81Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆79Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated 2 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 weeks ago
- Hijack a slack bot to phish your way in☆22Updated 3 weeks ago
- Living Off Security Tools☆43Updated 2 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆36Updated last week
- Canary Detection☆163Updated 9 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆45Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆54Updated 8 months ago
- A Pentest Collaboration and Reporting Tool☆53Updated last week
- God Mode Detection Rules☆133Updated 5 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆88Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆71Updated 10 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 3 months ago
- Stalker, the Extensible Attack Surface Management tool.☆79Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- ☆16Updated 2 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆97Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- Identify hardcoded secrets in static structured text (version 2)☆90Updated this week
- Security tool against dependency typosquatting attacks☆39Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆47Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆80Updated last month
- Signature based honeypot detector tool written in Golang☆85Updated last month