osintmatter / RequestShield
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆102Updated 4 months ago
Alternatives and similar repositories for RequestShield:
Users that are interested in RequestShield are comparing it to the libraries listed below
- Mapping of open-source detection rules and atomic tests.☆163Updated 3 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆162Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆167Updated this week
- Protection against HTML smuggling attacks.☆96Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- Putting a leash on naughty AWS permissions☆107Updated 2 weeks ago
- Canary Detection☆168Updated last year
- Halberd : Multi-Cloud Attack Platform☆269Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆80Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆102Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- ☆22Updated last month
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 5 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆168Updated 2 months ago
- Some settings stolen from multiple scripts @ZephrFish☆118Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- God Mode Detection Rules☆134Updated 8 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆122Updated last year
- A repository of credential stealer formats☆210Updated 3 weeks ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆62Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆136Updated 3 weeks ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆106Updated 5 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year