Threat Management
Tools for identifying, assessing, and mitigating cyber threats across organizations.Explore 255 curated tools and resources
RELATED TASKS
PINNED
Promoted • 6 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A free and open-source OSINT framework for gathering and analyzing data from various sources
A free and open-source OSINT framework for gathering and analyzing data from various sources
A collection of tools and resources for threat hunters.
A repository to aid Windows threat hunters in looking for common artifacts.
A repository to aid Windows threat hunters in looking for common artifacts.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A StalkPhish Project YARA repository for Phishing Kits zip files.
A StalkPhish Project YARA repository for Phishing Kits zip files.
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.
A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.
A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.
An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.
A Splunk app mapped to MITRE ATT&CK to guide threat hunts.
A tool for creating custom detection rules from YAML input
Repository for detection content with various types of rules and payloads.
Repository for detection content with various types of rules and payloads.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
Check the reputation of an IP address to identify potential threats.
Check the reputation of an IP address to identify potential threats.
A summary of the threat modeling posts and final thoughts on the process
A summary of the threat modeling posts and final thoughts on the process
OpenIOC editor for building and manipulating threat intelligence data with support for various systems.
OpenIOC editor for building and manipulating threat intelligence data with support for various systems.
Aggregates security threats from online sources and outputs to various formats.
Aggregates security threats from online sources and outputs to various formats.