HYAS Insight is a threat intelligence and cyber threat hunting platform that provides infrastructure intelligence for security operations. The platform offers visibility into adversary infrastructure including IP addresses, domains, and other internet resources used by threat actors for malicious activities and command and control operations. Key capabilities include: - Infrastructure intelligence analysis and threat hunting tools - SOC operations support with actionable intelligence and malware infrastructure data - Cyber threat intelligence program enablement with threat context and adversary profiling - Fraud investigation capabilities with infrastructure tracking and actor identity aggregation - Deep pivoting functionality through related infrastructure mapping - Verdicts on indicators of compromise (IOCs) with related infrastructure analysis - Integration with the HYAS Adversary Infrastructure Platform data lake - API access and intel feed integrations for security tools The platform processes billions of data points daily from proprietary, exclusive, commercial, and open source intelligence sources to provide infrastructure intelligence for threat detection, incident response, and security analysis.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.
Repository for detection content with various types of rules and payloads.
HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
RedEye is a visual analytic tool for enhancing Red and Blue Team operations.
Real-time, container-based file scanning system for threat hunting and incident response.
QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.
A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.