jeromesegura / fiddleitmLinks
Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆64Updated 3 months ago
Alternatives and similar repositories for fiddleitm
Users that are interested in fiddleitm are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆182Updated last week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 2 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 4 months ago
- God Mode Detection Rules☆134Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆187Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 5 months ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆132Updated 7 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆94Updated 4 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Proximity is a MCP security scanner powered with NOVA☆257Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆152Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated 3 weeks ago
- ☆75Updated 8 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆80Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Examine Chrome extensions for security issues☆88Updated 3 weeks ago
- Create honeypots for cloud environments☆104Updated 2 months ago
- Canary Detection☆188Updated last month
- A tool for mapping cyber crime☆223Updated 7 months ago
- Rules shared by the community from 100 Days of YARA 2025☆37Updated 10 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Updated last year
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆234Updated last week
- ☆36Updated 2 weeks ago
- Knowledge base on cybercriminal concealment techniques☆80Updated 7 months ago