
Security News
Django Joins curl in Pushing Back on AI Slop Security Reports
Django has updated its security policies to reject AI-generated vulnerability reports that include fabricated or unverifiable content.
A simple script to convert normal-text to Cyrillic-text. This allows hackers to obfuscate text in puny-code format which can lead into a lot of multiple Phishing attacks.
A simple script to convert normal-text to Cyrillic-text. This allows hackers to obfuscate text in puny-code format which can lead to a lot of multiple Phishing attacks.
$: ./sepunycoder.py
______ _______ ______ _
/ _____|_______|_____ \ | |
( (____ _____ _____) ) _ ____ _ _ ____ ___ __| |_____ ____
\____ \| ___) | ____/ | | | _ \| | | |/ ___) _ \ / _ | ___ |/ ___)
_____) ) |_____| | | |_| | | | | |_| ( (__| |_| ( (_| | ____| |
(______/|_______)_| |____/|_| |_|\__ |\____)___/ \____|_____)_|
(____/ Social Engineering Punycoder
by @hackermater
🔓 Enter the text to translate to Cyrillic: paypal.com/login
🔗 Do you want to add "https://" protocol? (y/n): y
👀 Translated text: https://раураl.соm/lоgin
# From Punycode String (IDNA) to ASCII
$: echo -n 'https://раураl.соm/lоgin' | idn -a
xn--https://l-7yha4qb5b.xn--m/lgin-vqfdw
# From Punycode String (IDNA/ASCII) to Unicode
$: echo -n 'xn--https://l-7yha4qb5b.xn--m/lgin-vqfdw' | idn -u
https://раураl.соm/lоgin
# When DNS try to resolve the host (Punycode String)
$: curl -I -X GET https://раураl.соm/lоgin
curl: (6) Could not resolve host: xn--l-7sba6dbr.xn--m-0tbi
idn
command is from Libidn"Punycode is a way to represent Unicode with the limited character subset of ASCII supported by the Domain Name System (DNS)".
Therefore this tool can be used for Social Engineering Attacks in the following scenarios:
Email Spoofing: Crafting email addresses that closely mimic those of trusted individuals or organizations using Punycode.
Fake Website Creation: Register domain names containing Punycode characters to replicate well-known websites.
Social Media Impersonation: Creation of Social Media profiles that impersonate genuine individuals or organizations.
Phishing campaigns: Generate phishing links with Punycode-encoded domain names so that victim click on seemingly authentic links.
This repository is intended for educational purposes only.
The scripts provided are meant to demonstrate social engineering techniques and should not be used for any malicious or unethical activities.
The author does not condone or support any illegal or unethical use of the information or tools provided in this repository.
Any actions taken by individuals using the scripts in this repository are their own responsibility.
The author is not liable for any misuse of the content within this repository.
Users are advised to use the scripts responsibly and in compliance with all applicable laws and regulations.
Thank you for your understanding and commitment to responsible use of the resources provided.
FAQs
A simple script to convert normal-text to Cyrillic-text. This allows hackers to obfuscate text in puny-code format which can lead into a lot of multiple Phishing attacks.
We found that sepunycoder demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Django has updated its security policies to reject AI-generated vulnerability reports that include fabricated or unverifiable content.
Security News
ECMAScript 2025 introduces Iterator Helpers, Set methods, JSON modules, and more in its latest spec update approved by Ecma in June 2025.
Security News
A new Node.js homepage button linking to paid support for EOL versions has sparked a heated discussion among contributors and the wider community.