osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆106Updated 11 months ago
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- Create honeypots for cloud environments☆103Updated last month
- Mapping of open-source detection rules and atomic tests.☆186Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 7 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆105Updated 5 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆105Updated 11 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆94Updated last month
- ☆56Updated 10 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆80Updated 3 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆59Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- ☆22Updated 8 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆98Updated 3 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 3 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆156Updated last month
- ☆18Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 2 months ago
- Some settings stolen from multiple scripts @ZephrFish☆131Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆155Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year