The Non Human Identity Threat Center is a threat intelligence platform focused on monitoring and analyzing threats targeting non-human identities across various industries. The platform tracks and provides detailed information about threat actors targeting service accounts, API keys, OAuth tokens, SAS tokens, and other non-human identity credentials. Key features include: - Industry-specific threat actor tracking and categorization - Detailed threat actor profiles with origin, status, and targeted industries - Activity trend monitoring and visualization - Reputation scoring system for threat actors - Real-time alerting for new threats in specific industries - Coverage of multiple sectors including healthcare, finance, energy, retail, and manufacturing The platform maintains a database of known threat actors, their tactics, tools, and behaviors, with particular emphasis on: - Automated scraping activities - Bot-driven attacks - API vulnerability exploitation - Credential theft - Phishing campaigns targeting non-human identities Users can filter threat actors by industry sector and receive updates about emerging threats relevant to their organization's sector.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
A free and open-source OSINT framework for gathering and analyzing data from various sources
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.