236 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityMaltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.
Automatic YARA rule generator based on Koodous reports with limited false positives.
Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.
A tool to extract indicators of compromise from security reports in PDF format.
A daily updated summary of security advisories from various sources
Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.
Collection of Yara rules for file identification and classification
A robust Python implementation of TAXII Services with a friendly pythonic API.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
Python-based client for IBM XForce Exchange with an improved version available.
A community-driven project sharing detection logic, adversary tradecraft, and resources to make detection development more efficient, following MITRE ATT&CK structure.
CAPECâ„¢ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
Collection of YARA signatures from recent malware research.
Proof-of-concept implementation of TAXII services for developers and non-developers.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Automatically curate open-source Yara rules and run scans with YAYA.
A collection of APT and cybercriminals campaigns with various resources and references.