Threat Management

236 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Taxii2 server for interacting with taxii services.

Real-time, container-based file scanning system for threat hunting and incident response.

Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.

CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.

Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data.

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.

Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

Repository of APT-related documents and notes sorted by year.

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

A collection of Yara rules licensed under the DRL 1.1 License.

Freely available network IOCs for monitoring and incident response

A Python library for interacting with TAXII servers

56
7
89