osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆102Updated 8 months ago
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated this week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆172Updated 5 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 11 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 7 months ago
- An index of publicly available and open-source threat detection rulesets.☆119Updated 3 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 8 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆98Updated 2 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆82Updated last month
- ☆22Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- Mapping of open-source detection rules and atomic tests.☆170Updated 6 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆55Updated 5 months ago
- Cyber threat intelligence tool suite.☆40Updated 4 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆136Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆72Updated 2 weeks ago
- Web Server Vulnerability Scanning Tool☆36Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 7 months ago
- Knowledge base on cybercriminal concealment techniques☆74Updated 2 months ago
- God Mode Detection Rules☆134Updated 11 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆180Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 10 months ago
- Living Off Security Tools☆45Updated 9 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆297Updated 3 weeks ago
- ☆54Updated 6 months ago
- Some settings stolen from multiple scripts @ZephrFish☆125Updated 3 months ago