VirusTotal is a service that analyzes suspicious files, domains, IPs, and URLs to detect malware and other breaches. It automatically shares the results with the security community, allowing for collaborative threat intelligence. The platform provides a range of features, including file scanning, URL scanning, and search functionality, as well as an API for automating submissions. By using VirusTotal, users can help to identify and combat malware and other cyber threats, while also contributing to the broader security community. Note: Users are advised not to submit personal information, and to review the Terms of Service and Privacy Notice before using the service.
FEATURES
ALTERNATIVES
Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.
A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A collection of APT and cybercriminals campaigns with various resources and references.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.