This platform provides real-time threat intelligence streams and reports on internet-exposed assets, helping organizations monitor and secure their attack surface. It uses a distributed platform of scanners and honeypots to acquire, classify, and correlate data, providing a global view of an organization's known and unknown assets. The platform scans the entire public internet, monitoring over 2 billion events every month, including 200 ports scanned and over 1 million torrents monitored, to provide a comprehensive view of an organization's internet attack surface.
FEATURES
ALTERNATIVES
A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.
Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.
Collection of Yara rules for file identification and classification
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.
Open source web app for storing and searching Actor related data from users and public repositories.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.