Binary Edge Logo

Binary Edge

0
Free
Visit Website

This platform provides real-time threat intelligence streams and reports on internet-exposed assets, helping organizations monitor and secure their attack surface. It uses a distributed platform of scanners and honeypots to acquire, classify, and correlate data, providing a global view of an organization's known and unknown assets. The platform scans the entire public internet, monitoring over 2 billion events every month, including 200 ports scanned and over 1 million torrents monitored, to provide a comprehensive view of an organization's internet attack surface.

FEATURES

ALTERNATIVES

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

Check the reputation of an IP address to identify potential threats.

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

A threat intelligence platform that collects, analyzes, and operationalizes threat data from multiple sources to help organizations identify and respond to security threats.

Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

Hippocampe is a threat feed aggregator with configurable confidence levels and a Hipposcore for determining maliciousness.

PINNED