
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
ThreatMiner is a threat intelligence portal designed to enable analysts to research under a single interface. It aggregates data from various open source feeds and provides contextual information related to indicators of compromise (IOCs). The portal allows analysts to research, pivot, and enrich data, and also provides links to external resources for additional information. ThreatMiner relies on various open source tools and data feeds, including IOCParser, APTNotes, CIRCL, VirusTotal, Malwr.com, Hybrid-Analysis, Alienvault OTX, ipinfo, Robtex, CleanMX, VirusShare, and Sinica. It also performs native DNS enrichment via native applications. The portal aims to free analysts from data collection and provide a single interface for carrying out tasks, from reading reports to pivoting and data enrichment.
Common questions about ThreatMiner including features, pricing, alternatives, and user reviews.
ThreatMiner is ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs). It is a Threat Management solution designed to help security teams with Cyber Threat Intelligence.
ThreatMiner is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://www.threatminer.org/ for download and installation instructions.
Popular alternatives to ThreatMiner include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
ThreatMiner is for security teams and organizations that need Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers
Real-time OSINT monitoring for leaked credentials, data, and infrastructure