Umbrella Investigate provides an API that allows querying for: Domain categorization, Security information about a domain, Co-occurrences for a domain, Related domains for a domain, Domains related to an IP, Domain tagging dates for a domain, DNS RR history for a domain, WHOIS information, WHOIS information for an email, WHOIS information for a nameserver, Historical WHOIS information for a domain, Latest malicious domains for an IP. To use the Investigate API wrapper import InvestigateApi class from threat_intel.opendns module: from threat_intel.opendns import InvestigateApi. To initialize the API wrapper you need the API key: investigate = InvestigateApi("<INVESTIGATE-API-KEY-HERE>"). You can also specify a file name where the API responses will be cached in a JSON file, to save you the bandwidth for the multiple calls about the same domains or IPs: investigate = InvestigateApi("<INVESTIGATE-API-KEY-HERE>", cache_file_name="/tmp/cache.opendns.json"). Domain categorization Calls domains/categorizat
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
A project sharing malicious URLs used for malware distribution to help protect networks.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.