Threat Management for Ioc
Tools for identifying, assessing, and mitigating cyber threats across organizations. Task: Ioc
Explore 24 curated tools and resources
RELATED TASKS
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
LATEST ADDITIONS
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.
OpenIOC editor for building and manipulating threat intelligence data with support for various systems.
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
A tool for extracting IOCs from various input sources and converting them into JSON format.
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
A tool to extract indicators of compromise from security reports in PDF format.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Freely available network IOCs for monitoring and incident response
A daily collection of IOCs from various sources, including articles and tweets.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.