jeromesegura / fiddleitmLinks
Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆63Updated 2 months ago
Alternatives and similar repositories for fiddleitm
Users that are interested in fiddleitm are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated 3 weeks ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- Proximity is a MCP security scanner powered with NOVA☆211Updated last month
- Examine Chrome extensions for security issues☆86Updated 3 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆92Updated 3 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆97Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- An index of publicly available and open-source threat detection rulesets.☆129Updated 6 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆94Updated last month
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆79Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated 2 weeks ago
- Canary Detection☆188Updated 3 weeks ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆109Updated this week
- ☆18Updated last month
- God Mode Detection Rules☆134Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- Repository of tools and resources for analyzing Docker containers☆71Updated last year
- Create honeypots for cloud environments☆103Updated last month
- ☆75Updated 7 months ago
- Turn any blog into structured threat intelligence.☆40Updated this week
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆227Updated this week
- ☆99Updated 2 weeks ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆144Updated 2 weeks ago
- ☆96Updated 3 weeks ago
- A tool for mapping cyber crime☆154Updated 7 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆104Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated 3 weeks ago