osintmatter / RequestShieldLinks
RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
☆103Updated 7 months ago
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below
Sorting:
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- ☆22Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆116Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆95Updated last month
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆243Updated this week
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 6 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 11 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆134Updated this week
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 7 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 6 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 3 weeks ago
- Mapping of open-source detection rules and atomic tests.☆169Updated 5 months ago
- Protection against HTML smuggling attacks.☆96Updated last month
- Some settings stolen from multiple scripts @ZephrFish☆121Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated 9 months ago
- Living Off Security Tools☆45Updated 8 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆55Updated 5 months ago
- ☆17Updated 3 weeks ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 9 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆84Updated 2 months ago
- Red Teaming for AI and Cloud☆181Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 9 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 3 weeks ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆62Updated last week