osintmatter / RequestShield
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆101Updated 3 months ago
Alternatives and similar repositories for RequestShield:
Users that are interested in RequestShield are comparing it to the libraries listed below
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆157Updated this week
- Mapping of open-source detection rules and atomic tests.☆158Updated 2 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- Halberd : Multi-Cloud Attack Platform☆256Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 3 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆75Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- Protection against HTML smuggling attempts.☆93Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆160Updated last month
- Some settings stolen from multiple scripts @ZephrFish☆118Updated last year
- ☆52Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆79Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆71Updated last week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆104Updated 4 months ago
- Automation tool for Windows Deception Host Burn-In☆84Updated 3 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- Dredging up secrets from the depths of the file system☆125Updated 4 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last month
- A repository of credential stealer formats☆204Updated this week
- Chista | Open Threat Intelligence Framework☆58Updated 10 months ago
- Collection of all previous 1337UP CTF challenges.☆68Updated 2 months ago
- ☆126Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- Canary Detection☆163Updated 11 months ago
- Generate datasets of cloud audit logs for common attacks☆208Updated 7 months ago
- Addon for BHCE☆40Updated 2 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year