Tools for identifying, assessing, and mitigating cyber threats across organizations. Task: Network SecurityExplore 9 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.
A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.
Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.
Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.
Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.
Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.
Freely available network IOCs for monitoring and incident response
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
A container of PCAP captures mapped to the relevant attack tactic