osintmatter / RequestShield
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆102Updated 5 months ago
Alternatives and similar repositories for RequestShield:
Users that are interested in RequestShield are comparing it to the libraries listed below
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆163Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- Living Off Security Tools☆45Updated 6 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆177Updated last week
- Mapping of open-source detection rules and atomic tests.☆163Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- God Mode Detection Rules☆134Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated 7 months ago
- Some settings stolen from multiple scripts @ZephrFish☆118Updated last week
- Knowledge base on cybercriminal concealment techniques☆31Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 9 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆105Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆109Updated last week
- Protection against HTML smuggling attacks.☆97Updated last week
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆54Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated last month
- ☆54Updated 3 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 4 months ago
- Web Server Vulnerability Scanning Tool☆35Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆169Updated 2 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆112Updated last week
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆70Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- ☆22Updated 2 months ago