CI Army List is a comprehensive list of IP addresses that can be used for cybersecurity purposes, such as threat intelligence, incident response, and security research. The list contains a vast number of IP addresses that can be used to identify potential security threats and improve overall cybersecurity posture. The list is regularly updated to ensure that it remains relevant and effective in identifying potential security threats. It is a valuable resource for cybersecurity professionals, researchers, and organizations looking to improve their cybersecurity defenses. By using the CI Army List, organizations can improve their threat detection and response capabilities, reduce the risk of cyber attacks, and improve their overall cybersecurity posture.
FEATURES
SIMILAR TOOLS
Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.
Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.
Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
A collection of APT and cybercriminals campaigns with various resources and references.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.