glaubermagal / evilurl
A cybersecurity tool designed to safeguard against IDN Homograph Attacks
☆37Updated 4 months ago
Alternatives and similar repositories for evilurl:
Users that are interested in evilurl are comparing it to the libraries listed below
- Protection against HTML smuggling attempts.☆92Updated last week
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆78Updated 7 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last month
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- Living Off Security Tools☆45Updated 4 months ago
- Canary Detection☆164Updated 11 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 5 months ago
- Modular web-application honeypot platform built using go and gin☆56Updated 10 months ago
- ☆52Updated 2 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆94Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆29Updated 2 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆36Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated 2 weeks ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆69Updated 2 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 4 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- Automation tool for Windows Deception Host Burn-In☆83Updated 3 months ago