Threat Intelligence Platforms

TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.

Explore 280 curated cybersecurity tools, with 15,216 visitors searching for solutions

QRadio Logo

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

0
botvrij.eu Logo

Freely available network IOCs for monitoring and incident response

0
cabby Logo

A Python library for interacting with TAXII servers

0
MalPipe Logo

A modular malware collection and processing framework with support for various threat intelligence feeds.

0
TypeDB CTI Logo

An open source threat intelligence platform for storing and managing cyber threat intelligence knowledge.

0
Hostintel Logo

Collect various intelligence sources for hosts in CSV format.

0
WOMBAT Project Logo

A project focusing on understanding and combating threats to the Internet economy and net citizens.

0
DailyIOC Logo

A daily collection of IOCs from various sources, including articles and tweets.

0
Malware Indicators of Compromise Logo

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

0
FireHOL IP Aggregator Logo

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

0
Threat Bus Logo

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

0
Tor Exit Addresses Logo

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

0
Vulners Logo

All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.

0
Hale Logo

Hale is a modular botnet command and control monitoring tool that tracks C&C server communications across multiple protocols with web-based analysis interface and collaborative research capabilities.

0
Hiryu Logo

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

0
MITRE ATT&CK and CAPEC Datasets in STIX 2.0 Logo

Repository containing MITRE ATT&CK and CAPEC threat intelligence datasets formatted in STIX 2.0 standard for cybersecurity analysis and threat intelligence sharing.

0
Maltiverse Logo

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

0
Cyber Cure free intelligence feeds Logo

Intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.

0
FileIntel Logo

A modular tool for collecting intelligence sources for files and outputting in CSV format.

0
LOKI Logo

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

0
libtaxii Logo

A Python library for handling TAXII v1.x messages and services to enable automated threat intelligence sharing and indicator exchange.

0
AttackerKB Logo

A platform providing an activity feed on exploited vulnerabilities.

0
Malware Signatures Overview Logo

A collection of Yara signatures developed by Citizen Lab to detect malware used in targeted attacks against civil society organizations.

0
Posh-VirusTotal PowerShell Module Logo

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Threat Intelligence Platforms Tools - FAQ

Common questions about Threat Intelligence Platforms tools including selection guides, pricing, and comparisons.

TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.

Have more questions? Browse our categories or search for specific tools.