Loading...
Browse 33 threat research tools
Threat intelligence service providing threat profiles and analytics for MDR
Threat intelligence service providing threat profiles and analytics for MDR
Threat intel platform providing daily defensive recommendations & coverage maps
Threat intel platform providing daily defensive recommendations & coverage maps
Custom threat profiling services for industry-specific cyber threats
Custom threat profiling services for industry-specific cyber threats
Threat intel service focused on adversary attribution and monitoring
Threat intel service focused on adversary attribution and monitoring
Threat intel platform for discovering cybercrime on encrypted chat networks
Threat intel platform for discovering cybercrime on encrypted chat networks
Cloud-based lab environment for testing security solutions and simulations
Cloud-based lab environment for testing security solutions and simulations
Autonomous security R&D lab building AI systems for threat detection & response
Autonomous security R&D lab building AI systems for threat detection & response
Weekly threat intelligence briefings published by VerSprite
Weekly threat intelligence briefings published by VerSprite
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Bot defense platform protecting websites, mobile apps, and APIs from attacks
Bot defense platform protecting websites, mobile apps, and APIs from attacks
Domain intelligence platform for threat research and investigation
Domain intelligence platform for threat research and investigation
CTI platform providing structured threat intelligence and analysis
CTI platform providing structured threat intelligence and analysis
Cybersecurity research blog covering threat intelligence and malware analysis
Cybersecurity research blog covering threat intelligence and malware analysis
Free threat intel platform for DNS data analysis and infrastructure mapping
Free threat intel platform for DNS data analysis and infrastructure mapping
DNS-based threat intelligence platform for early threat detection
DNS-based threat intelligence platform for early threat detection
Custom threat intel investigations by analysts for security assessments
Custom threat intel investigations by analysts for security assessments
Threat intelligence, incident response, and security consulting services
Threat intelligence, incident response, and security consulting services
Cloud service threat research & control library for AWS, Azure, and GCP
Cloud service threat research & control library for AWS, Azure, and GCP
Cyber threat intelligence platform with adversary tracking capabilities
Cyber threat intelligence platform with adversary tracking capabilities
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
CrowdFMS is a CrowdStrike framework that automates malware sample collection from VirusTotal using YARA rule-based notifications and the Private API system.
CrowdFMS is a CrowdStrike framework that automates malware sample collection from VirusTotal using YARA rule-based notifications and the Private API system.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.
A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance