Binary Edge
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
GCTI's open source detection signatures repository contains a collection of open-source detection signatures for various malware and threats. These signatures are designed to be used with various security tools and systems to detect and prevent malicious activities. The repository is maintained by GCTI and is updated regularly to include new signatures and improve detection capabilities.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
Taxii2 server for interacting with taxii services.
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
A tool for extracting IOCs from various input sources and converting them into JSON format.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.