Threat Management

236 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

Automatic YARA rule generator based on Koodous reports with limited false positives.

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

A tool to extract indicators of compromise from security reports in PDF format.

Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.

Collection of Yara rules for file identification and classification

A robust Python implementation of TAXII Services with a friendly pythonic API.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

Python-based client for IBM XForce Exchange with an improved version available.

A community-driven project sharing detection logic, adversary tradecraft, and resources to make detection development more efficient, following MITRE ATT&CK structure.

CAPECâ„¢ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

YETI Logo
0.0

Proof-of-concept implementation of TAXII services for developers and non-developers.

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

Automatically curate open-source Yara rules and run scans with YAYA.

A collection of APT and cybercriminals campaigns with various resources and references.

45
6
78