Threat Management
Tools for identifying, assessing, and mitigating cyber threats across organizations.
Explore 239 curated tools and resources
RELATED TASKS
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
LATEST ADDITIONS
A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.
A daily collection of IOCs from various sources, including articles and tweets.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.
A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.
Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.
A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.
Official repository of YARA rules for threat detection and hunting
Repository containing MITRE ATT&CK and CAPEC datasets in STIX 2.0 for cybersecurity threat modeling.
Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.
Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.