πŸ“‚ Subcategories

πŸ”§ Tools in Threat Intelligence

Jit

Security as Code, Simplified.

A platform that helps developers easily implement and manage security controls across their CI/CD pipeline.

For more tool information ➜

Legit Security

Secure Your Software Supply Chain.

A platform for securing the software supply chain from code to cloud and managing SDLC security posture.

For more tool information ➜

TruffleHog

Find leaked secrets, wherever they are.

An open-source and enterprise tool for finding exposed secrets in code repositories, filesystems, and more.

For more tool information ➜

Cyble

World's Leading AI-Powered Threat Intelligence & AI-Native Security.

An AI-powered threat intelligence company that helps organizations manage cyber risks.

For more tool information ➜

Cybersixgill

Cyber Threat Intelligence that Gets You Ahead of the Game.

A cyber threat intelligence company that provides real-time, actionable intelligence from the deep, dark, and clear web.

For more tool information ➜

VirusTotal

Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches.

An online service that analyzes files and URLs for malware.

For more tool information ➜

Intel 471

The Premier Cybercrime Intelligence Provider.

Provides adversary and malware intelligence from the cybercriminal underground.

For more tool information ➜

SOCRadar

Extended Threat Intelligence.

A unified platform for external attack surface management, digital risk protection, and cyber threat intelligence.

For more tool information ➜

ANY.RUN

Interactive Online Malware Sandbox

A cloud-based sandbox for dynamic and static malware analysis.

For more tool information ➜

IDA Pro

The Ultimate Disassembler and Debugger

A powerful and programmable interactive disassembler and debugger.

For more tool information ➜

Process Monitor (ProcMon)

An advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity.

A Windows utility that provides real-time monitoring of system activity.

For more tool information ➜

VirusTotal

Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

A free online service that analyzes files and URLs for malware.

For more tool information ➜

BrandShield

AI-Powered Online Brand Protection.

Detects and removes online threats like phishing, counterfeits, and brand impersonation.

For more tool information ➜

Bolster

Automated Digital Risk Protection.

Uses AI to automate the detection and takedown of online scams and phishing sites.

For more tool information ➜

Group-IB Digital Risk Protection

AI-driven digital risk protection.

Identifies and mitigates digital risks and intellectual property violations online.

For more tool information ➜

ThreatModeler

The Intelligent Threat Modeling Platform.

An automated threat modeling solution that provides a unified view of threats across applications, cloud, and infrastructure.

For more tool information ➜

Cycode

The Application Security Posture Management (ASPM) Platform.

A platform that provides visibility, risk-driven prioritization, and remediation across the entire SDLC.

For more tool information ➜

Tromzo

The New Way to Do Product Security.

An Application Security Posture Management (ASPM) platform that prioritizes vulnerabilities based on code and runtime context.

For more tool information ➜

GitGuardian

The Code Security Platform for the Enterprise.

A leading platform for secrets detection and remediation within the software development lifecycle.

For more tool information ➜

Semgrep

Static analysis at ludicrous speed.

An open-source, fast, and customizable static analysis tool for finding bugs and enforcing code standards.

For more tool information ➜

CrowdStrike Falcon Intelligence

Know your adversary. Stop breaches.

Automated threat intelligence integrated into a leading endpoint protection platform.

For more tool information ➜

SpyCloud

Automated identity threat protection.

Proactively prevents ransomware and account takeover, detects insider threats, and safeguards employee and consumer identities.

For more tool information ➜

Constella Intelligence

World-Class Identity Protection and Identity Risk Intelligence.

A global leader in digital risk protection, specializing in protecting executives, brands, and employees from digital threats.

For more tool information ➜

Recorded Future

Advanced Cyber Threat Intelligence.

The world's largest threat intelligence company, providing real-time, unbiased, and actionable intelligence.

For more tool information ➜

Intel 471

Intelligence-Driven Cyber Security.

Provides adversary and malware intelligence for leading security teams.

For more tool information ➜

Mandiant Threat Intelligence

Actionable, adversary-focused intelligence.

Provides threat intelligence derived from real-world incident response and research.

For more tool information ➜

CrowdStrike Falcon Intelligence

Know your adversary. Stop the breach.

Integrates automated threat intelligence into endpoint protection for proactive defense.

For more tool information ➜

Cybersixgill

The Threat Intelligence Data Company.

Provides automated, real-time threat intelligence from the deep and dark web.

For more tool information ➜

Kaspersky Threat Intelligence

Actionable intelligence, to see further and respond faster.

Provides threat intelligence from a world-renowned cybersecurity research team.

For more tool information ➜

Cyble

AI-Powered Threat Intelligence.

An AI-powered platform for external attack surface and brand intelligence.

For more tool information ➜

Ghidra

A software reverse engineering (SRE) framework

A free and open-source reverse engineering tool developed by the NSA.

For more tool information ➜

Wireshark

Go deep.

The world's foremost and widely-used network protocol analyzer.

For more tool information ➜

VMRay Analyzer

Advanced Malware Sandbox & Phishing Analysis

An advanced malware sandbox that provides deep visibility into threat behavior.

For more tool information ➜

Recorded Future

The world’s leading threat intelligence company.

A threat intelligence platform that provides real-time insights into cyber threats.

For more tool information ➜

Joe Sandbox

Deep Malware Analysis

An automated malware analysis platform for deep threat analysis.

For more tool information ➜

Intezer

Autonomous SOC

An autonomous security operations platform that uses genetic malware analysis.

For more tool information ➜

CrowdStrike Falcon

AI-native cybersecurity to stop breaches.

A cloud-native platform for endpoint security, threat intelligence, and cyberattack response.

For more tool information ➜

Recorded Future

The world's leading threat intelligence company.

Provides real-time threat intelligence to proactively defend against cyber attacks.

For more tool information ➜

CrowdStrike Falcon Intelligence

Know Your Adversary.

Provides automated, actionable threat intelligence to help stop breaches.

For more tool information ➜

Mandiant Threat Intelligence

Take decisive action with industry-leading intelligence.

Provides intelligence and expertise acquired from the frontlines of incident response.

For more tool information ➜

CybelAngel

The External Threat Intelligence Platform.

Detects exposed enterprise data and corporate assets outside the firewall.

For more tool information ➜

SafeGuard Cyber

Security & Compliance for Human Connections.

Provides security and compliance for modern communication channels.

For more tool information ➜

Apiiro

The Proactive Application Risk Management Platform.

A code risk platform that connects application risks from design to code to cloud.

For more tool information ➜

SpectralOps

Developer-first code security.

A security scanner that finds and fixes hardcoded secrets, security misconfigurations, and risky code.

For more tool information ➜

StackHawk

DAST and API Security Testing for Developers.

A dynamic application and API security testing tool built for automation in CI/CD.

For more tool information ➜

Recorded Future

Universal threat intelligence.

A threat intelligence platform providing context and insights from a vast amount of data.

For more tool information ➜

Darktrace

The Essential AI Cybersecurity Platform.

A global leader in cybersecurity AI, delivering a platform that detects, investigates, and responds to cyber threats.

For more tool information ➜

Digital Shadows

Smarter Insights for Faster Response.

Provides threat intelligence to help organizations protect against external threats, reduce their attack surface, and minimize digital risk.

For more tool information ➜

ZeroFox

External Cybersecurity.

Provides external cybersecurity solutions to protect organizations from threats outside their perimeter.

For more tool information ➜

Flashpoint

The Leader in Threat Intelligence.

Delivers actionable intelligence to help organizations detect, prioritize, and remediate threats.

For more tool information ➜

Recorded Future

The world's largest provider of intelligence for enterprise security.

Provides context-driven threat intelligence to proactively defend against cyber attacks.

For more tool information ➜

AT&T Alien Labs Open Threat Exchange (OTX)

The World's First and Largest Open Threat Intelligence Community.

A free, community-driven platform for sharing threat intelligence.

For more tool information ➜

Flashpoint

The Leader in Threat Intelligence.

Provides intelligence from the deep and dark web to identify and mitigate risks.

For more tool information ➜

Secureworks

Taegis: The Threat-Informed Defense.

Provides threat intelligence as part of its Taegis XDR platform and managed services.

For more tool information ➜

Proofpoint Threat Intelligence

People-centric threat intelligence.

Provides threat intelligence focused on email-borne threats and the human factor.

For more tool information ➜

ZeroFox

External Cybersecurity.

Provides external cybersecurity solutions, including threat intelligence and digital risk protection.

For more tool information ➜

Rapid7 Threat Command

External Threat Intelligence.

Provides external threat intelligence to identify and mitigate risks outside the firewall.

For more tool information ➜

ReversingLabs

The definitive authority in software and file security.

Provides solutions for software supply chain security and malware analysis.

For more tool information ➜

MISP (Malware Information Sharing Platform)

Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing

An open-source platform for sharing, storing, and correlating threat intelligence.

For more tool information ➜

Hybrid Analysis

Free Malware Analysis Service

A free online sandbox for analyzing malware and suspicious files.

For more tool information ➜

Palo Alto Networks WildFire

Cloud-Delivered Malware Analysis

A cloud-based malware analysis service that provides advanced threat protection.

For more tool information ➜

ZeroFox

External Cybersecurity for the Modern Era.

Provides external cybersecurity solutions to protect against threats outside the perimeter.

For more tool information ➜

ReliaQuest GreyMatter Digital Risk Protection

See and secure your entire attack surface.

Provides visibility into the external attack surface and mitigates digital risks.

For more tool information ➜

Flashpoint

The Leader in Threat Intelligence.

Delivers threat intelligence from illicit online communities to mitigate risk.

For more tool information ➜

Rapid7 Threat Command

Eliminate threats originating from the open, deep, and dark web.

An external threat intelligence solution that identifies and mitigates threats.

For more tool information ➜

Red Points

The most-used Brand Protection software.

Provides a solution to find and remove counterfeits, piracy, and brand abuse online.

For more tool information ➜

IriusRisk

The AI Threat Modeling Tool for Secure Software Development.

An automated threat modeling platform that helps developers and security teams build secure software from the start.

For more tool information ➜

Snyk

AI-powered Developer Security Platform.

A platform that finds and fixes vulnerabilities in code, open source dependencies, containers, and IaC.

For more tool information ➜

DarkOwl

Dark Web Threat Intelligence & Darknet Data for Cybersecurity Teams.

A leading provider of darknet data, offering the largest commercially available database of darknet content.

For more tool information ➜

ThreatConnect

The TI Ops Platform.

A platform that unifies threat intelligence, security orchestration, and response.

For more tool information ➜

Cuckoo Sandbox

Open Source Automated Malware Analysis System

An open-source tool for automated malware analysis in a sandboxed environment.

For more tool information ➜

Zscaler Cloud Sandbox

AI-Powered Malware Defense

A cloud-based sandbox that provides advanced threat protection against zero-day attacks.

For more tool information ➜

ThreatConnect

Cyber Threat Intelligence & Risk Quantification

A platform for threat intelligence, security orchestration, and cyber risk quantification.

For more tool information ➜

Anomali ThreatStream

The Leading Threat Intelligence Platform

A threat intelligence platform that helps organizations to detect, investigate, and respond to threats.

For more tool information ➜

Microsoft Defender Threat Intelligence

Know your adversary. Protect your organization.

Provides threat intelligence to understand and defend against modern cyber threats.

For more tool information ➜

Palo Alto Networks Cortex Xpanse

Own Your Attack Surface.

An active attack surface management (ASM) solution that discovers and mitigates external risks.

For more tool information ➜

Fortra Brand Protection

End-to-end Digital Risk Protection.

Detects and mitigates fraud, brand impersonation, and online attacks.

For more tool information ➜

ThreatConnect

The only threat intelligence platform (TIP) with a built-in SOAR.

A platform that combines threat intelligence, automation, and orchestration.

For more tool information ➜

Anomali

The Security Operations Platform.

Provides an AI-powered platform for threat intelligence and security analytics.

For more tool information ➜

Veracode

The Application Security Company.

A comprehensive application security platform offering SAST, DAST, SCA, and developer training.

For more tool information ➜

Anomali ThreatStream

The AI-Powered TIP for Fast Detection and Response.

A threat intelligence platform (TIP) that aggregates, normalizes, and enriches threat data from hundreds of sources.

For more tool information ➜

ThreatConnect

Threat and Risk Informed Cyber Defense Powered by AI

A unified platform for Threat Intelligence, Security Orchestration (SOAR), and Cyber Risk Quantification.

For more tool information ➜

IBM X-Force Exchange

Collaborative Threat Intelligence

A cloud-based threat intelligence sharing platform from IBM.

For more tool information ➜

Anomali ThreatStream

The Leading Threat Intelligence Platform.

Aggregates and manages threat intelligence from multiple sources to operationalize it.

For more tool information ➜

IBM X-Force Exchange

Collaborative Threat Intelligence.

A cloud-based threat intelligence sharing platform.

For more tool information ➜

Cisco Secure Malware Analytics (Threat Grid)

Advanced automated malware analysis and threat intelligence.

A malware analysis and threat intelligence platform from Cisco.

For more tool information ➜

Corsearch

Brand Protection, Trademark & Domain Solutions.

Provides brand protection and trademark solutions to safeguard intellectual property.

For more tool information ➜

SD Elements

Build Secure, Compliant Software from the Start.

A Security by Design platform that automates threat modeling and secure development requirements.

For more tool information ➜

Checkmarx

Make security intrinsic to your software.

An enterprise platform for application security testing, covering SAST, SCA, IAST, and IaC security.

For more tool information ➜

Trellix Malware Analysis (HX)

Advanced Malware Analysis

A malware analysis solution that provides deep visibility into advanced threats.

For more tool information ➜

Mandiant Threat Intelligence

Intelligence and expertise from the frontlines.

Threat intelligence derived from extensive incident response experience, now part of Google Cloud.

For more tool information ➜

NordStellar

External threat intelligence for business.

A threat exposure management platform that helps businesses detect compromised data, prepare for cyberattacks, and avoid cyber threats.

For more tool information ➜

Palo Alto Networks Unit 42

Actionable insight from a world-renowned threat intelligence team.

Provides threat intelligence and research from Palo Alto Networks' elite team of researchers.

For more tool information ➜

Cisco Talos Intelligence

Threat Intelligence for the Real World.

One of the largest commercial threat intelligence teams in the world.

For more tool information ➜

Spamhaus

The world leader in threat intelligence.

Provides real-time, actionable threat intelligence focused on spam, phishing, and malware.

For more tool information ➜

Abuse.ch

Fighting malware and botnets.

A non-profit project providing threat intelligence on malware and botnets.

For more tool information ➜

Memcyco

Real-Time Digital Impersonation & ATO Fraud Protection.

Provides real-time protection against website impersonation and account takeover fraud.

For more tool information ➜

Trellix Insights

Stay ahead of your adversary with proactive security.

A threat intelligence solution that provides real-time intelligence to empower proactive action against cyberthreats.

For more tool information ➜

ThreatQuotient ThreatQ

Data-driven security operations for smarter threat detection and response.

A threat intelligence platform that enables organizations to aggregate, analyze, and act on threat intelligence.

For more tool information ➜

Cybersixgill

Real-time cyber threat intelligence from the clear, deep, and dark web.

A cyber threat intelligence company that monitors the deep and dark web for threat intelligence.

For more tool information ➜

Secureworks Taegis XDR

Superior detection, unmatched response, and an open platform for the highest ROI.

A cloud-native XDR solution that integrates threat detection, analytics, and response across various environments.

For more tool information ➜

SophosLabs Intelix

High-fidelity threat intelligence to support informed decisions.

A cloud-based threat intelligence and analysis platform that provides detailed analysis for files, web pages, and IP addresses.

For more tool information ➜

OWASP Threat Dragon

An open-source threat modeling tool from OWASP.

A free, open-source, cross-platform threat modeling application for creating diagrams and identifying threats.

For more tool information ➜

Microsoft Threat Modeling Tool

A core element of the Microsoft Security Development Lifecycle (SDL).

A free tool from Microsoft that helps identify and mitigate potential security issues early in the development lifecycle.

For more tool information ➜

Threagile

Agile Threat Modeling as Code.

An open-source, IDE-based toolkit for agile threat modeling using a declarative YAML format.

For more tool information ➜

CAIRIS

Computer Aided Integration of Requirements and Information Security.

An open-source platform for specifying and modeling secure and usable systems.

For more tool information ➜

securiCAD

Proactive Cybersecurity Management.

An automated threat modeling and attack simulation tool for enterprise IT environments.

For more tool information ➜

PyTM

A Pythonic framework for threat modeling.

An open-source Python framework for defining threat models as code.

For more tool information ➜

Tutamen

Automated Threat Modeling.

A tool designed to automate and simplify the threat modeling process for developers.

For more tool information ➜