osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆103Updated 6 months ago
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated this week
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆112Updated last month
- Protection against HTML smuggling attacks.☆96Updated this week
- ☆53Updated 4 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆202Updated this week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆37Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆120Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆164Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 9 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆184Updated 2 weeks ago
- ☆22Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆82Updated last month
- 🪟 Windows ➡️ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during u…☆35Updated 2 weeks ago
- Web Server Vulnerability Scanning Tool☆36Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆108Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- Mapping of open-source detection rules and atomic tests.☆165Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated 5 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆49Updated 3 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆43Updated this week
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated 3 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆139Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆81Updated last month
- Living Off Security Tools☆45Updated 7 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆88Updated this week
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago