Darkscope is an AI-powered cyber threat intelligence platform that monitors cyberspace to identify potential security risks and threats targeting organizations. The platform uses proprietary AI technology called "Seekers" - virtual personas that can engage in conversations, respond to forum entries, and receive emails to gather intelligence from the deep web, social media, and dark web. These Seekers are paired with SearchDrones to scan over 200 million dark web pages weekly. Key monitoring capabilities include: - Dark web forums, chats, and marketplaces - Social media platforms with sentiment analysis - User-generated content from platforms like Reddit, 4Chan, and 9Gag - Telegram and Signal groups - High-risk user identification - Breached user account detection - Domain and subdomain scanning - Web service configuration errors - SSL and DNS misconfigurations - APT campaign detection - Partner and supplier risk assessment The platform provides three main services: Cyber Threat Sentinel for continuous risk assessment, CIQ360 for third-party cyber risk rating, and Cyber Watchtower as the premium service combining all capabilities. It generates cyber risk scores and provides early warning alerts when threats are detected. Darkscope operates across multiple regions including New Zealand, Australia, UK, and Germany, offering threat intelligence services to help organizations understand their attack surface and potential vulnerabilities before they are exploited.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.
A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.
ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.
Real-time, container-based file scanning system for threat hunting and incident response.
A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.