Penetration testing commands for Threat Intelligence
Threat intelligence involves gathering and analysing data about current and emerging threats, providing valuable context to help organisations pre-empt and respond to cyber attacks.
Name | Description | Price |
---|---|---|
Maltego | Interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet (exists in Community Edition) | Paid |
MISP | Threat intelligence platform & open standards for threat information sharing (formerly known as Malware Information Sharing Platform) | Free |
Netglub | Maltego alternative | Free |
OpenCTI | Platform designed for managing and analyzing cyber threat intelligence knowledge, centralizing data using the STIX2 standard and offering visualization and integration capabilities | Free |
PatrowlHears | Provides a unified source of vulnerability, exploit and threat Intelligence feeds; comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information | Paid |
Pulsedive | CTI platform to search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own | Free |
Redirect Tracker | Track the HTTP redirect chains; 301 and 302, JavaScript and Meta fresh redirects | Free |
threatfeeds.io | Open-source threat intelligence feeds; sharing malware URLs, IP reputation, bad IPs, etc. | Free |
ThreatIngestor | Extract and aggregate threat intelligence (IOCs from threat feeds) | Free |
ThreatKB | Knowledge base workflow management for YARA rules and C2 artifacts | Free |
Watcher | Automated platform for discovering new potentially cybersecurity threats targeting your assets (detects typosquatting domain names, monitor malicious domain names, detects data leaks...) | Free |
Yeti | Organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository | Free |