Home / Threat Defense / Threat Management

Threat Management

Proactive threat management identifies, assesses, and neutralizes cyber risks for robust defense.

Try these 256 AI Threat Management Tools

2024 Data Breach Investigations Report
Free

2024 Data Breach Investigations Report View 2024 Data Breach Investigations Report

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

AbuseHelper
Free

AbuseHelper View AbuseHelper

A collection of APT and cybercriminals campaigns with various resources and references.

abuse.ch
Free

abuse.ch View abuse.ch

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

AbuseIPDB
Free

AbuseIPDB View AbuseIPDB

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

Acapulco (Attack Community grAPh COnstruction)
Free

Acapulco (Attack Community grAPh COnstruction) View Acapulco (Attack Community grAPh COnstruction)

Open source web app for storing and searching Actor related data from users and public repositories.

ActorTrackr
Free

ActorTrackr View ActorTrackr

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Adversary Emulation Library
Free

Adversary Emulation Library View Adversary Emulation Library

Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.

Akamai Hunt
Free

Akamai Hunt View Akamai Hunt

A daily updated summary of security advisories from various sources

Amazon GuardDuty
Free

Amazon GuardDuty View Amazon GuardDuty

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.

AppCompatProcessor
Free

AppCompatProcessor View AppCompatProcessor

Scan files or process memory for Cobalt Strike beacons and parse their configuration.

APT & Cybercriminals Campaign Collection
Free

APT & Cybercriminals Campaign Collection View APT & Cybercriminals Campaign Collection

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

AttackerKB
Free

AttackerKB View AttackerKB

Generate Bro intel files from pdf or html reports.

AttackRuleMap
Free

AttackRuleMap View AttackRuleMap

Repository of IOCs provided under the Apache 2.0 license

ATT&CK® Navigator
Free

ATT&CK® Navigator View ATT&CK® Navigator

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

AttackIQ
Free

AttackIQ View AttackIQ

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

APT-Hunter
Free

APT-Hunter View APT-Hunter

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

APT Notes
Free

APT Notes View APT Notes

Automatically curate open-source Yara rules and run scans with YAYA.

APT Groups and Operations
Free

APT Groups and Operations View APT Groups and Operations

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

AT&T Alien Labs Open Threat Exchange
Free

AT&T Alien Labs Open Threat Exchange View AT&T Alien Labs Open Threat Exchange

Tool for visualizing correspondences between YARA ruleset and samples

Bearded Avenger
Free

Bearded Avenger View Bearded Avenger

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

BGP Ranking
Free

BGP Ranking View BGP Ranking

A Pythonic framework for automated threat modeling shifting left.

Binary Defense IP Banlist
Free

Binary Defense IP Banlist View Binary Defense IP Banlist

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

Binary Edge
Free

Binary Edge View Binary Edge

A daily collection of IOCs from various sources, including articles and tweets.

BlueBox Malware Analysis Box and Cyber Threat Hunting
Free

BlueBox Malware Analysis Box and Cyber Threat Hunting View BlueBox Malware Analysis Box and Cyber Threat Hunting

Repository of Yara Rules created by TjNel.