Packet Storm is a global security resource that provides around-the-clock information and tools to help mitigate personal data and fiscal loss on a global scale. The platform offers a wide range of resources, including RSS feeds, Twitter, and Facebook updates, to keep users informed of the latest security threats and vulnerabilities. With a vast collection of security-related data, Packet Storm is a valuable resource for system administrators, security researchers, governments, corporations, and individuals seeking to stay ahead of cybersecurity threats. The site's resources include exploits, advisories, whitepapers, and tools, making it a one-stop-shop for all security-related needs. By providing access to comprehensive security information, Packet Storm empowers users to make informed decisions and take necessary actions to protect themselves and their organizations from potential security breaches.
FEATURES
SIMILAR TOOLS
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.
Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.
OpenIOC editor for building and manipulating threat intelligence data with support for various systems.
An open source threat intelligence platform for storing and managing cyber threat intelligence knowledge.
Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.
A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.