Penetration testing commands for Threat Intelligence

Threat intelligence involves gathering and analysing data about current and emerging threats, providing valuable context to help organisations pre-empt and respond to cyber attacks.

NameDescriptionPrice
MaltegoInteractive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet (exists in Community Edition)Paid
MISPThreat intelligence platform & open standards for threat information sharing (formerly known as Malware Information Sharing Platform)Free
NetglubMaltego alternativeFree
OpenCTIPlatform designed for managing and analyzing cyber threat intelligence knowledge, centralizing data using the STIX2 standard and offering visualization and integration capabilitiesFree
PatrowlHearsProvides a unified source of vulnerability, exploit and threat Intelligence feeds; comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news informationPaid
PulsediveCTI platform to search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your ownFree
Redirect TrackerTrack the HTTP redirect chains; 301 and 302, JavaScript and Meta fresh redirectsFree
threatfeeds.ioOpen-source threat intelligence feeds; sharing malware URLs, IP reputation, bad IPs, etc.Free
ThreatIngestorExtract and aggregate threat intelligence (IOCs from threat feeds)Free
ThreatKBKnowledge base workflow management for YARA rules and C2 artifactsFree
WatcherAutomated platform for discovering new potentially cybersecurity threats targeting your assets (detects typosquatting domain names, monitor malicious domain names, detects data leaks...)Free
YetiOrganize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repositoryFree