TypeDB CTI is an open source threat intelligence platform that allows organizations to store and manage their cyber threat intelligence (CTI) knowledge in one database, enabling professionals to gain new insights about cyber threats by bringing together disparate CTI information. It enables data modeling based on logical and object-oriented principles, making it easy to create complex schemas and ingest various networks of CTI data. TypeDB's logical inference capability during query runtime helps discover new insights from existing CTI data, such as inferred transitive relations indicating the attribution of attack patterns to specific entities. It also facilitates linking hash values, IP addresses, or any shared data values.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Check the reputation of an IP address to identify potential threats.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Hippocampe is a threat feed aggregator with configurable confidence levels and a Hipposcore for determining maliciousness.
Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
Aggregates security threats from online sources and outputs to various formats.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.