Home / Threat Defense / Threat Management

Threat Management

Proactive threat management identifies, assesses, and neutralizes cyber risks for robust defense.

Try these 256 AI Threat Management Tools

2024 Data Breach Investigations Report
Free

2024 Data Breach Investigations Report

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

AbuseHelper
Free

AbuseHelper

A collection of APT and cybercriminals campaigns with various resources and references.

abuse.ch
Free

abuse.ch

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

AbuseIPDB
Free

AbuseIPDB

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

Acapulco (Attack Community grAPh COnstruction)
Free

Acapulco (Attack Community grAPh COnstruction)

Open source web app for storing and searching Actor related data from users and public repositories.

ActorTrackr
Free

ActorTrackr

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Adversary Emulation Library
Free

Adversary Emulation Library

Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.

Akamai Hunt
Free

Akamai Hunt

A daily updated summary of security advisories from various sources

Amazon GuardDuty
Free

Amazon GuardDuty

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.

AppCompatProcessor
Free

AppCompatProcessor

Scan files or process memory for Cobalt Strike beacons and parse their configuration.

APT & Cybercriminals Campaign Collection
Free

APT & Cybercriminals Campaign Collection

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

AttackRuleMap
Free

AttackRuleMap

Repository of IOCs provided under the Apache 2.0 license

ATT&CK® Navigator
Free

ATT&CK® Navigator

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

AttackIQ
Free

AttackIQ

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

APT-Hunter
Free

APT-Hunter

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

APT Notes
Free

APT Notes

Automatically curate open-source Yara rules and run scans with YAYA.

APT Groups and Operations
Free

APT Groups and Operations

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

AT&T Alien Labs Open Threat Exchange
Free

AT&T Alien Labs Open Threat Exchange

Tool for visualizing correspondences between YARA ruleset and samples

Bearded Avenger
Free

Bearded Avenger

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

BGP Ranking
Free

BGP Ranking

A Pythonic framework for automated threat modeling shifting left.

Binary Defense IP Banlist
Free

Binary Defense IP Banlist

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

Binary Edge
Free

Binary Edge

A daily collection of IOCs from various sources, including articles and tweets.

BlueBox Malware Analysis Box and Cyber Threat Hunting
Free

BlueBox Malware Analysis Box and Cyber Threat Hunting

Repository of Yara Rules created by TjNel.