RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
β105Dec 2, 2024Updated last year
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.β49Nov 17, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ46Aug 5, 2025Updated 8 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- AWS honey token managerβ90Aug 1, 2024Updated last year
- β40Aug 2, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 7 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- Security tool against dependency typosquatting attacksβ55Mar 31, 2026Updated last week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β101Mar 28, 2026Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ85Mar 24, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated 2 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Sep 21, 2024Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β185Feb 9, 2025Updated last year
- Telling tales on you for leaking secrets!β233Mar 30, 2026Updated last week
- β23Mar 4, 2025Updated last year
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.β174Jan 9, 2026Updated 2 months ago
- β154Dec 19, 2024Updated last year
- Automated web vulnerability scanning with LLM agentsβ457Jun 18, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β62Jan 25, 2025Updated last year
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated last month
- β90Feb 12, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β42Mar 31, 2026Updated last week
- β44Jul 17, 2025Updated 8 months ago
- Halberd : Multi-Cloud Agentic Attack Toolβ335Jan 12, 2026Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcroβ¦β76Apr 1, 2026Updated last week
- Linux CS bypass techniqueβ33Feb 4, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Unauthenticated enumeration of AWS IAM Roles.β26Sep 7, 2025Updated 7 months ago
- A tool to uncover undocumented APIs from the AWS Console.β120Mar 16, 2026Updated 3 weeks ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 4 months ago
- A web CTF for training developers in bug hunting and secure coding!β100Jan 12, 2025Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β90Dec 7, 2025Updated 4 months ago
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Mar 10, 2025Updated last year