osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆106Updated last year
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Updated 5 months ago
- Create honeypots for cloud environments☆109Updated 4 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆338Updated this week
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆247Updated this week
- ☆23Updated 11 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago
- Cyber threat intelligence tool suite.☆42Updated 10 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆83Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated last week
- Web Server Vulnerability Scanning Tool☆36Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- 🛡️ High-performance WAF & CDN detection tool with effectiveness testing suite. Identify protection layers (Cloudflare, Akamai, AWS) and …☆106Updated this week
- ☆56Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆195Updated this week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆40Updated 5 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago