Non Human Identity Threat Center Logo

Non Human Identity Threat Center

0
Free
Visit Website

The Non Human Identity Threat Center is a threat intelligence platform focused on monitoring and analyzing threats targeting non-human identities across various industries. The platform tracks and provides detailed information about threat actors targeting service accounts, API keys, OAuth tokens, SAS tokens, and other non-human identity credentials. Key features include: - Industry-specific threat actor tracking and categorization - Detailed threat actor profiles with origin, status, and targeted industries - Activity trend monitoring and visualization - Reputation scoring system for threat actors - Real-time alerting for new threats in specific industries - Coverage of multiple sectors including healthcare, finance, energy, retail, and manufacturing The platform maintains a database of known threat actors, their tactics, tools, and behaviors, with particular emphasis on: - Automated scraping activities - Bot-driven attacks - API vulnerability exploitation - Credential theft - Phishing campaigns targeting non-human identities Users can filter threat actors by industry sector and receive updates about emerging threats relevant to their organization's sector.

FEATURES

ALTERNATIVES

An informational repo about hunting for adversaries in your IT environment.

A tool to extract indicators of compromise from security reports in PDF format.

Open Source Threat Intelligence Collector with plugin-oriented framework.

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Sample detection rules and dashboards for Google Security Operations

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.