CI Army List Logo

CI Army List

0
Free
Visit Website

CI Army List is a comprehensive list of IP addresses that can be used for cybersecurity purposes, such as threat intelligence, incident response, and security research. The list contains a vast number of IP addresses that can be used to identify potential security threats and improve overall cybersecurity posture. The list is regularly updated to ensure that it remains relevant and effective in identifying potential security threats. It is a valuable resource for cybersecurity professionals, researchers, and organizations looking to improve their cybersecurity defenses. By using the CI Army List, organizations can improve their threat detection and response capabilities, reduce the risk of cyber attacks, and improve their overall cybersecurity posture.

FEATURES

ALTERNATIVES

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security