Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
Free breach monitoring platform for compromised credential detection & alerting.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
API providing historical & current DNS, WHOIS, and domain intelligence data.
AI fraud prevention platform that intercepts scammers to uncover mule accounts.
API platform providing historical DNS, WHOIS, and IP data for security research.
AI platform automating threat modeling & compliance for connected device makers.
Self-service cloud platform for controlled DDoS simulation and resilience testing.
IP reputation & threat intel API backed by honeypot sensors and community reports.
Threat intel firm identifying human actors behind cyber threats.
Community-driven phishing URL archive operated by Cisco Talos.
Digital threat intel platform with 300TB+ of malware data, AI analytics & forecasting.
AI-driven threat modeling for identifying security risks in design phase
Network threat detection platform (product page unavailable)
AI-powered continuous threat modeling for cloud applications in runtime
API providing access to compromised identity data and threat signals
Cyber intelligence platform for threat detection and security posture mgmt
3D cyber threat visualization platform for external threat monitoring
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Based on user ratings and community engagement on CybersecTools, the top-rated Threat Management tools are:
Yes. Out of 24 threat management tools listed on CybersecTools, 8 are free and 16 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.