RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats. It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
β104Dec 2, 2024Updated last year
Alternatives and similar repositories for RequestShield
Users that are interested in RequestShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 7 months ago
- The official website for The Discord Analytics for Risks & Threats Project.β23Dec 29, 2025Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 3 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.β49Nov 17, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ47Aug 5, 2025Updated 9 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β30Nov 26, 2025Updated 5 months ago
- AWS honey token managerβ90Aug 1, 2024Updated last year
- β39Aug 2, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- Security tool against dependency typosquatting attacksβ56Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β102May 10, 2026Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ86Apr 7, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Sep 21, 2024Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspβ¦β189Feb 9, 2025Updated last year
- Telling tales on you for leaking secrets!β235May 12, 2026Updated last week
- β24Mar 4, 2025Updated last year
- eBPF Memory Dump Toolβ105May 7, 2026Updated last week
- An OpenAI API Compatible Honeypot Gatewayβ22Mar 17, 2025Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.β180Jan 9, 2026Updated 4 months ago
- β154Dec 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated web vulnerability scanning with LLM agentsβ462Jun 18, 2025Updated 11 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β63Jan 25, 2025Updated last year
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated 3 months ago
- β89Feb 12, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β45May 13, 2026Updated last week
- β44Jul 17, 2025Updated 10 months ago
- Halberd : Multi-Cloud Agentic Attack Toolβ336Apr 8, 2026Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year
- Linux CS bypass techniqueβ33Feb 4, 2025Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcroβ¦β80Updated this week
- A tool to uncover undocumented APIs from the AWS Console.β121Mar 16, 2026Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16May 2, 2026Updated 2 weeks ago
- A web CTF for training developers in bug hunting and secure coding!β100Jan 12, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.β26Apr 18, 2026Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β89Dec 7, 2025Updated 5 months ago
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 10 months ago