Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis.
Browse 450 threat management tools
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
Freely available network IOCs for monitoring and incident response
A project focusing on understanding and combating threats to the Internet economy and net citizens.
Free cyber threat intelligence feeds for proactive threat detection
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
List of publicly disclosed vulnerabilities with security filters and detailed advisories.
OpenTAXII config enabling TAXII-based threat intel sharing with MISP.
Healthcare-specific cyber threat intelligence & situational awareness platform.
Dark web intelligence platform for stealer log and credential exposure detection.
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence
Threat intel platform detecting mass exploitation & recon via deception nets
Continuous threat intelligence and exposure management across dark, deep & clear web.
DentiGrid is an AI security platform that monitors, detect & prevent cyber threats.
AI-powered threat verification for phone numbers, websites, text messages, and emails
Threat intel platform with dark web monitoring, ASM, and brand protection.
Automated threat intel service with IoC search, feeds, and SIEM/SOAR integrations.
Blockchain threat intel & crypto forensics platform for AML and investigations.
AI-driven binary code analysis platform for malware detection & intelligence.
Threat detection, correlation, and intel feed platform for SecOps teams.
Dark web threat intelligence platform for detecting & investigating cyber threats.
450 tools across 4 specializations · 174 free, 276 commercial
Advanced Persistent Threat Detection
APT detection tools that identify sophisticated, long-term cyber attacks and advanced persistent threat campaigns.
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
Threat Modeling
Threat modeling tools for identifying security risks, attack vectors, and potential threats in system architectures.
Common questions about Threat Management tools, selection guides, pricing, and comparisons.
A TIP aggregates threat data from multiple sources (commercial feeds, open-source, ISACs, internal telemetry), normalizes it into structured formats (STIX/TAXII), and distributes indicators of compromise (IOCs) to your security tools. You need a TIP if you consume multiple threat feeds, want to correlate external intelligence with internal incidents, or need to share intelligence with peers and ISACs.
Penetration testing is a point-in-time assessment where human testers attempt to find and exploit vulnerabilities. Threat simulation (breach and attack simulation) continuously and automatically tests your security controls against known attack techniques mapped to MITRE ATT&CK. Pen testing finds novel vulnerabilities; threat simulation validates that your defenses work against known attacks on an ongoing basis.
Threat modeling identifies potential security threats during the design phase, before any code is written. By systematically analyzing data flows, trust boundaries, and attack surfaces, teams can prioritize which threats to mitigate architecturally rather than patching vulnerabilities after deployment. Common frameworks include STRIDE, PASTA, and attack trees.
Based on user ratings and community engagement on CybersecTools, the top-rated Threat Management tools are:
Yes. Out of 24 threat management tools listed on CybersecTools, 9 are free and 15 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.
Threat Simulation
Threat simulation platforms for testing security controls, validating defenses, and simulating real-world cyber attacks.