AttackIQ Logo

AttackIQ

0
Commercial
Visit Website

AttackIQ is a platform that provides breach and attack simulation products for security control validation. The platform emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and offers visibility into security program performance with data-driven analysis and mitigation guidance. AttackIQ offers three different products: Enterprise, Ready!, and Flex. Enterprise is a co-managed service for mature security organizations, allowing them to test their controls whenever they want with advanced intelligence. Ready! is a fully managed breach and attack simulation service for small and medium-sized businesses that lack the personnel to run a continuous security validation program. Flex is a test-as-a-service option for organizations that want to run spot checks or ad-hoc testing without a license. The platform aims to help organizations proactively measure the effectiveness of their security controls and fine-tune them to keep up with the evolving threat landscape, ultimately reducing the cost of breaches and improving security operations efficiency

FEATURES

ALTERNATIVES

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

Repository of Yara signatures for detecting targeted attacks on civil society organizations

Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.

VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.

A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.

MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.

Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

PINNED