Binary Defense Systems provides a free threat intelligence feed and banlist feed for public use only, containing a list of IP addresses known to be malicious. The feed is not to be used for commercial resale or in products that charge fees for such services. The feed includes a list of IP addresses that have been identified as malicious, including IP addresses associated with malware, phishing, and other cyber threats. By using this feed, users can enhance their security posture by blocking or monitoring traffic from these known malicious IP addresses.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.
BotScout.com provides proactive bot detection, screening, and banning through a powerful API.
AbuseIPDB offers tools and APIs to report and check abusive IPs, enhancing network security.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
Facilitates distribution of Threat Intelligence artifacts to defensive systems.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.