Kestrel
Overview
Real-time phishing and lookalike-domain detection for your browser, with inline warnings on Gmail email links.
Kestrel warns you about phishing and lookalike websites, including links inside emails, before you click. How it works - Detects domain lookalikes: when you visit a site whose name resembles a known brand (paypa1.com, cosico.com, fedex1.com), a site you visit often (netfl1x.com vs your real netflix.com), or a domain you've added to your personal protected-brand list, Kestrel shows a full-width warning banner explaining why. - Scans email links in Gmail: badges suspicious links inline and shows a banner at the top of the message. Click any badge to see the specific reason ("Says paypal.com but actually goes to example.com", "bit.ly is a URL shortener"). - Combines local heuristics with Google Safe Browsing for known malware and phishing sites. Privacy - Your browsing history stays on your device. Kestrel reads it to build a local in-memory index of sites you visit, and never transmits it. - Email scanning reads only link URLs and the sender's From address. Message text, attachments, and subjects are never read or uploaded. - Only the current URL is sent to Google Safe Browsing for reputation lookups, the same lookup Chrome's built-in Safe Browsing performs. - You control the trust list: dismiss any warning you disagree with, or remove sites from the local index from the popup.
0 out of 5No ratings
Details
- Version1.0.0
- UpdatedMay 14, 2026
- Offered byDavid
- Size73.96KiB
- LanguagesEnglish
- Developer
Email
support@ovantalabs.com - Non-traderThis developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.
Privacy
Kestrel has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.
Kestrel handles the following:
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes