glaubermagal / evilurlLinks
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
β38Updated this week
Alternatives and similar repositories for evilurl
Users that are interested in evilurl are comparing it to the libraries listed below
Sorting:
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β53Updated 2 weeks ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β74Updated last week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β99Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β37Updated 3 months ago
- Protection against HTML smuggling attacks.β96Updated 3 weeks ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Updated 8 months ago
- Web Server Vulnerability Scanning Toolβ36Updated 4 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.ioβ83Updated last year
- BlueSky OSINT Toolβ14Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ48Updated 4 months ago
- A Powerful Network Reconnaissance Tool for Security Professionalsβ101Updated 7 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.β66Updated this week
- Autonomous AI C2β31Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.β120Updated 3 months ago
- Modular web-application honeypot platform built using go and ginβ58Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Updated last month
- β22Updated 5 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β40Updated 6 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.β84Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsβ73Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β173Updated 6 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β27Updated 2 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potentialβ¦β102Updated 8 months ago
- Living Off Security Toolsβ45Updated 9 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β71Updated last year
- Canary Detectionβ187Updated 2 months ago
- An OpenAI API Compatible Honeypot Gatewayβ16Updated 4 months ago
- Rules shared by the community from 100 Days of YARA 2025β34Updated 6 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β36Updated last week