osintmatter / RequestShield
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆101Updated 4 months ago
Alternatives and similar repositories for RequestShield:
Users that are interested in RequestShield are comparing it to the libraries listed below
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆68Updated last week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆157Updated this week
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆159Updated 2 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆160Updated last month
- Protection against HTML smuggling attempts.☆93Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 3 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆72Updated last week
- Web Server Vulnerability Scanning Tool☆31Updated 3 weeks ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆174Updated 10 months ago
- Some settings stolen from multiple scripts @ZephrFish☆118Updated last year
- ☆126Updated last month
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆37Updated last month
- God Mode Detection Rules☆134Updated 7 months ago
- ☆21Updated last month
- Collection of all previous 1337UP CTF challenges.☆69Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Halberd : Multi-Cloud Attack Platform☆256Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆134Updated this week
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 3 weeks ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆75Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 6 months ago
- LLMBUS red team tool 🚍☆35Updated last month
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- Canary Detection☆163Updated 11 months ago