Launched this week
Perseus Sheild

Perseus Sheild

Open-source browser sandbox to survive malicious links

2 followers

Perseus Shield is an open-source browser isolation sandbox that lets you open untrusted links safely. It runs Google Chrome inside a Docker container with a virtual display and Web-VNC access, fully isolating browsing activity from your host OS. Designed for phishing, malware research, and everyday “suspicious link” hygiene — clone, run, browse, destroy. No VMs. No complex setup. Just Docker and a browser.
Perseus Sheild  gallery image
Perseus Sheild  gallery image
Free
Launch tags:WindowsOpen SourceGitHub
Launch Team
Turbotic Automation AI
Turbotic Automation AI
Build powerful automations without code. 1 Month Free!
Promoted

What do you think? …

Yevgeni Vainshtein
I built Perseus Shield after experiencing a real “1-click” phishing attempt on a professional network — no download, no obvious exploit, just a malicious link. Traditional antivirus tools didn’t flag anything because the attack relied on unknown infrastructure and short-lived payloads. Perseus Shield is my answer: instead of trusting links, isolate them. I’d love feedback from security engineers, developers, and anyone who deals with suspicious links regularly. Browser isolation without VMs Fully Docker-based (KISS) Web-based access (no local X11) Disposable browsing sessions Built for unknown-unknown threats Designed after real phishing / 1-click attacks