jeromesegura / fiddleitmLinks
Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆52Updated last month
Alternatives and similar repositories for fiddleitm
Users that are interested in fiddleitm are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- An index of publicly available and open-source threat detection rulesets.☆118Updated 2 months ago
- ☆146Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆144Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 6 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 9 months ago
- Examine Chrome extensions for security issues☆85Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- A tool for mapping cyber crime☆149Updated 2 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆81Updated 3 weeks ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆178Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆99Updated 6 months ago
- ☆17Updated 3 weeks ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- God Mode Detection Rules☆134Updated 11 months ago
- ☆86Updated last month
- ☆92Updated last month
- ☆73Updated 3 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated 3 weeks ago
- List of past and future infosec related events.☆157Updated this week
- Canary Detection☆183Updated last month
- Knowledge base on cybercriminal concealment techniques☆72Updated 2 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆91Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Hacked up scripts to perform google searches☆16Updated last year
- Extracting IoC data from eMail☆134Updated last week
- Modular web-application honeypot platform built using go and gin☆58Updated last year