Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis. Task: Cyber Threat Intelligence
Browse 325 security tools
API platform providing historical DNS, WHOIS, and IP data for security research.
Free breach monitoring platform for compromised credential detection & alerting.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
IP reputation & threat intel API backed by honeypot sensors and community reports.
Cybersecurity market intelligence platform for tracking competitors & funding
Threat intel firm identifying human actors behind cyber threats.
Community-driven phishing URL archive operated by Cisco Talos.
Digital threat intel platform with 300TB+ of malware data, AI analytics & forecasting.
AI-powered continuous threat modeling for cloud applications in runtime
API providing access to compromised identity data and threat signals
Cyber intelligence platform for threat detection and security posture mgmt
3D cyber threat visualization platform for external threat monitoring
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
A project focusing on understanding and combating threats to the Internet economy and net citizens.
Free cyber threat intelligence feeds for proactive threat detection
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
Dark web intelligence platform for stealer log and credential exposure detection.
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence