236 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityLOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A Python library for handling TAXII v1.x Messages and invoking TAXII Services.
A platform providing an activity feed on exploited vulnerabilities.
Repository of Yara signatures for detecting targeted attacks on civil society organizations
Open Source Threat Intelligence Gathering and Processing Framework
Real-time monitoring tool for newly issued SSL certificates.
The FASTEST Way to Consume Threat Intelligence and make it actionable.
eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
Repository of Yara Rules created by TjNel.
Tool for managing Yara rules on VirusTotal
MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.
A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.
Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.
Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.
A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.
In-depth analysis of real-world attacks and threat tactics