abuse.ch is a platform providing community-driven threat intelligence on cyber threats, focusing on malware and botnets. It offers actionable threat intelligence data and operates platforms for IT security researchers to share relevant threat intel data with the community. Data from abuse.ch is integrated into many commercial and open-source security products, aiding vendors, organizations, ISPs, law enforcement, and government entities in fighting cyber threats.
FEATURES
SIMILAR TOOLS
Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.
OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.
HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A modular tool for collecting intelligence sources for files and outputting in CSV format.
Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.
A platform for accessing threat intelligence and collaborating on cyber threats.
Python-based client for IBM XForce Exchange with an improved version available.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.