osintmatter / RequestShield
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆88Updated last month
Alternatives and similar repositories for RequestShield:
Users that are interested in RequestShield are comparing it to the libraries listed below
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆51Updated 2 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 weeks ago
- Mapping of open-source detection rules and atomic tests.☆81Updated this week
- Protection against HTML smuggling attempts.☆83Updated last week
- God Mode Detection Rules☆133Updated 5 months ago
- Canary Detection☆163Updated 9 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆165Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆79Updated 5 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 3 months ago
- Halberd : Multi-Cloud Attack Platform☆239Updated this week
- Generate datasets of cloud audit logs for common attacks☆192Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆132Updated 2 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 4 months ago
- Some settings stolen from multiple scripts @ZephrFish☆114Updated 10 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆47Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆80Updated last month
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆36Updated last month
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆189Updated last week
- Examine Chrome extensions for security issues☆68Updated this week
- ☆94Updated last week
- Multi-services Asynchronous Honeypot Solution with real-time threat detection☆73Updated 2 weeks ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆97Updated 2 months ago
- Dredging up secrets from the depths of the file system☆118Updated 2 months ago
- A Pentest Collaboration and Reporting Tool☆53Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 3 months ago
- Living Off Security Tools☆43Updated 2 months ago
- ☆72Updated 2 weeks ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆117Updated 5 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆43Updated last week