Threat Management

235 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

A tool for creating custom detection rules from YAML input

Repository for detection content with various types of rules and payloads.

IntelMQ Logo

IntelMQ

0 (0)

IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.

Check the reputation of an IP address to identify potential threats.

A summary of the threat modeling posts and final thoughts on the process

OpenIOC editor for building and manipulating threat intelligence data with support for various systems.

Aggregates security threats from online sources and outputs to various formats.

HoneyDB Logo

HoneyDB

0 (0)

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

Hunter Logo

Hunter

0 (0)

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

A collection of YARA rules for research and hunting purposes.

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

Scan files or process memory for Cobalt Strike beacons and parse their configuration.

RedEye Logo

RedEye

0 (0)

RedEye is a visual analytic tool for enhancing Red and Blue Team operations.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.

12
3
45