Zero Day Live is a cyber threat intelligence and observatory platform that provides early detection of malware and zero-day vulnerabilities. The platform operates through a proprietary sensor network that processes over 1 billion data points to identify emerging threats before they are weaponized. It delivers curated threat intelligence feeds with a focus on accuracy and signal-to-noise ratio. Key capabilities include: - Early threat detection, typically 5-12 days ahead of other sources - Identification of new malware and zero-day vulnerabilities - Linking threat actors to cybercriminal activities and cryptocurrency transactions - Non-invasive deployment requiring no system replacements, sensors, agents, or hardware - Proactive threat neutralization before attacks are launched The platform aims to enhance existing security measures by providing exclusive threat insights and actionable intelligence to organizations seeking to improve their cyber defense posture.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
A project sharing malicious URLs used for malware distribution to help protect networks.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.