RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
β105Dec 2, 2024Updated last year
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 2 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.β49Nov 17, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ47Aug 5, 2025Updated 8 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 5 months ago
- AWS honey token managerβ90Aug 1, 2024Updated last year
- β40Aug 2, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 7 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Jan 2, 2025Updated last year
- Security tool against dependency typosquatting attacksβ55Apr 21, 2026Updated last week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β102Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ87Apr 7, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Sep 21, 2024Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β185Feb 9, 2025Updated last year
- β23Mar 4, 2025Updated last year
- eBPF Memory Dump Toolβ104Apr 13, 2026Updated 2 weeks ago
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.β179Jan 9, 2026Updated 3 months ago
- β155Dec 19, 2024Updated last year
- Automated web vulnerability scanning with LLM agentsβ461Jun 18, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β63Jan 25, 2025Updated last year
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated 2 months ago
- β89Feb 12, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β44Updated this week
- β44Jul 17, 2025Updated 9 months ago
- Halberd : Multi-Cloud Agentic Attack Toolβ337Apr 8, 2026Updated 3 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- Linux CS bypass techniqueβ33Feb 4, 2025Updated last year
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcroβ¦β79Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to uncover undocumented APIs from the AWS Console.β121Mar 16, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16Apr 8, 2026Updated 3 weeks ago
- A web CTF for training developers in bug hunting and secure coding!β100Jan 12, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.β26Apr 18, 2026Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β89Dec 7, 2025Updated 4 months ago
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ51Mar 10, 2025Updated last year