jeromesegura / fiddleitmLinks
Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆58Updated 2 weeks ago
Alternatives and similar repositories for fiddleitm
Users that are interested in fiddleitm are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆177Updated 6 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆86Updated 3 weeks ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆105Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated 2 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆139Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 2 months ago
- ☆74Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- Signature based honeypot detector tool written in Golang☆102Updated 5 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- ☆90Updated 3 weeks ago
- NOVA: The Prompt Pattern Matching☆164Updated last month
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆109Updated 10 months ago
- ☆94Updated 3 weeks ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 7 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆94Updated this week
- Extracting IoC data from eMail☆138Updated last month
- ☆54Updated 3 weeks ago
- God Mode Detection Rules☆134Updated last year
- OpenBAS Docker deployment helpers☆23Updated this week
- Turn any blog into structured threat intelligence.☆36Updated this week
- A repository of credential stealer formats☆224Updated 2 months ago