osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆103Updated 8 months ago
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆177Updated 6 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 5 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated last week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆99Updated 2 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated last week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆120Updated last week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆82Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆152Updated this week
- An archive of 0day.today exploits☆155Updated last month
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆76Updated last week
- Mapping of open-source detection rules and atomic tests.☆175Updated 7 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆39Updated 3 weeks ago
- Cyber threat intelligence tool suite.☆41Updated 4 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆85Updated 2 weeks ago
- Web Server Vulnerability Scanning Tool☆36Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 months ago
- ☆17Updated 2 months ago
- ☆22Updated 5 months ago
- ☆54Updated 7 months ago
- A collection of methods to learn who the owner of an IP address is.☆169Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 7 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆144Updated last week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆133Updated last year
- Living Off Security Tools☆45Updated 10 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆55Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago