jeromesegura / fiddleitm
Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆29Updated this week
Alternatives and similar repositories for fiddleitm:
Users that are interested in fiddleitm are comparing it to the libraries listed below
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆74Updated 3 weeks ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆163Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆142Updated this week
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆89Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.☆54Updated 3 weeks ago
- Lacus is a capturing system using playwright, as a web service.☆65Updated this week
- Examine Chrome extensions for security issues☆81Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- High signal information security sources Goggle.☆67Updated 2 years ago
- Website for ail-typo-squatting library☆58Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆95Updated 4 months ago
- C2 Active Scanner☆59Updated 10 months ago
- God Mode Detection Rules☆134Updated 9 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆41Updated last month
- Signature based honeypot detector tool written in Golang☆92Updated last month
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆87Updated 9 months ago
- ☆137Updated 2 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆113Updated this week
- Canary Detection☆168Updated last year
- The core backend server handling API requests and task management☆39Updated 2 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Extracting IoC data from eMail☆133Updated 4 months ago
- Hacked up scripts to perform google searches☆16Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated last week
- ☆87Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated 2 weeks ago