SecurityTrails API offers robust APIs and data services for security teams, providing access to a vast repository of historical DNS lookups, WHOIS records, hostnames, and domains. The API enables users to conduct cyber forensics, prevent brand attacks, and investigate cybercrime. It can be used to manage infrastructure sprawl, search for digital assets, and enrich datasets. With the SecurityTrails API, users can fetch domain, DNS, and IP-related data, and leverage comprehensive datasets to make informed decisions. The API is easy to use and provides curated and up-to-date data, enabling users to get accurate insights and find key facts quickly.
FEATURES
ALTERNATIVES
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Sample detection rules and dashboards for Google Security Operations
Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.
A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.
A simple, self-contained modular host-based IOC scanner for incident responders.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.
CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.