
Malware Signatures Overview is a free Threat Intelligence Platforms tool. Security professionals most commonly compare it with Webz.io. All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Malware Signatures Overview, including their key features and shared capabilities.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Free breach monitoring platform for compromised credential detection & alerting.
Cybersecurity market intelligence platform for tracking competitors & funding
GCTI's open-source detection signatures for malware and threat detection
Shares 3 capabilities with Malware Signatures Overview: Open Source, Cyber Threat Intelligence, Signature Based Detection
ActorTrackr is an open source web application for storing, searching, and linking threat actor intelligence data from public repositories and user contributions.
Shares 3 capabilities with Malware Signatures Overview: Threat Research, Open Source, Cyber Threat Intelligence
Cyber threat intelligence platform with adversary tracking capabilities
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Free breach monitoring platform for compromised credential detection & alerting.
Cybersecurity market intelligence platform for tracking competitors & funding
GCTI's open-source detection signatures for malware and threat detection
ActorTrackr is an open source web application for storing, searching, and linking threat actor intelligence data from public repositories and user contributions.
Cyber threat intelligence platform with adversary tracking capabilities
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
Malware intelligence marketplace aggregating multiple detection engines
Open-source threat intelligence platform for organizing and operationalizing CTI
Centralized threat intelligence platform for aggregating and operationalizing IOCs
Enterprise threat intelligence platform with APAC focus and adversary tracking
Enterprise file analysis platform for high-volume malware detection
CTI platform providing structured threat intelligence and analysis
Domain intelligence platform for threat research and investigation
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Weekly threat intelligence briefings published by VerSprite
Threat intel platform for discovering cybercrime on encrypted chat networks
Threat intel service focused on adversary attribution and monitoring
Threat intelligence service providing threat profiles and analytics for MDR
Subscription threat intel service with reports, translations & security notifications.
Managed CTI service monitoring dark web & open sources for emerging threats.
Mobile-focused threat intelligence portal for detecting and analyzing mobile threats.
Continuous, private malware analysis and threat intel platform for enterprises.
API providing historical & current DNS, WHOIS, and domain intelligence data.
A Python library for handling TAXII v1.x messages and services to enable automated threat intelligence sharing and indicator exchange.
A threat intelligence platform monitoring threat actors targeting non-human identities
Free threat intel platform for DNS data analysis and infrastructure mapping
Free contextual federated search tool for threat intelligence enrichment
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
n6 is a network security incident exchange system that collects, manages, and distributes threat and incident data through REST API and web interfaces for authorized users.
CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.
Knowledge base workflow management dashboard for YARA rules and C2 artifacts.
OSTrICa is an open source plugin-based framework that collects and visualizes threat intelligence data from various sources to help cybersecurity professionals correlate IoCs and enhance their defensive capabilities.
YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.
A neo4j-based data management platform with command-line interface for analyzing cyber threat indicators and other data points through graph database traversal.
Repository containing MITRE ATT&CK and CAPEC threat intelligence datasets formatted in STIX 2.0 standard for cybersecurity analysis and threat intelligence sharing.
A data visualization and statistical analysis tool for measuring the quality and effectiveness of threat intelligence indicator feeds through various analytical tests.
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
nyx is a threat intelligence artifact distribution system that facilitates the sharing of threat intelligence indicators from various sources to defensive security systems with configurable criticality levels.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.
A publicly available dataset of security incidents designed to support cybersecurity research and threat analysis.
Common questions security professionals ask when evaluating alternatives and competitors to Malware Signatures Overview.
The most popular alternatives to Malware Signatures Overview include Webz.io, Hudson Rock Cybercrime Intelligence Tools, Lunar, CybersecRadars, and GCTI Open Source Detection Signatures. These Threat Intelligence Platforms tools offer similar capabilities and are frequently compared by security professionals evaluating their options.