26 filtered links (26 total)

Cyber Threat OSINT

Collect and analyze cyber threat intelligence using OSINT techniques, including indicator of compromise (IOC) tracking, malware analysis, and threat actor monitoring.

Filters
Clear all
Search
Cost
Access
Updated
26 matching links

OWASP

OWASP offers open security standards, testing guidance, and application security resources used in defensive and investigative work. This resource supports threat intelligence, vulnerability research, and IOC investigation.

Cost: Free Access: Open Source

Pentesting Toolkit

Pentesting Toolkit provides capabilities for repository intelligence, developer profiling, and source-code reconnaissance. Attack Surface Management Platform. Contribute to 1N3/Sn1per development by creating an account on GitHub.

Cost: Free Access: Open Source

Phishtank

PhishTank collects and verifies phishing URLs, helping analysts investigate malicious campaigns and block fraudulent domains. This resource supports threat intelligence, vulnerability research, and IOC investigation.

Cost: Free Access: Open Source

Port Scan

Port Scan provides capabilities for repository intelligence, developer profiling, and source-code reconnaissance. TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

Cost: Free Access: Open Source

Port Scan Scraper

Port Scan Scraper provides capabilities for repository intelligence, developer profiling, and source-code reconnaissance. online port scan scraper. Contribute to vesche/scanless development by creating an account on GitHub.

Cost: Free Access: Open Source

Pulsedive

Pulsedive is an OSINT resource for vulnerability and threat intelligence analysis. It supports threat intelligence, vulnerability research, and IOC investigations.

Cost: Free Access: Open Source

Ransomware finder

Ransomware finder provides capabilities for threat intelligence, vulnerability research, and IOC investigation. Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.

Cost: Free Access: Open Source

Reverse Engineering

Reverse Engineering provides capabilities for repository intelligence, developer profiling, and source-code reconnaissance. Ghidra is a software reverse engineering (SRE) framework.

Cost: Free Access: Open Source

Scan Maldoc

Scan Maldoc is an OSINT resource for vulnerability and threat intelligence analysis. It supports threat intelligence, vulnerability research, and IOC investigations.

Cost: Free Access: Open Source

Security Headers

Security Headers is an OSINT resource for privacy protection and operational security workflows. It supports threat intelligence, vulnerability research, and IOC investigations.

Cost: Free Access: Open Source

Shadowserver

Shadowserver provides capabilities for threat intelligence, vulnerability research, and IOC investigation. Dashboard · The Shadowserver Foundation.

Cost: Free Access: Open Source

Sitecheck

Sitecheck provides capabilities for threat intelligence, vulnerability research, and IOC investigation. SiteCheck is a website security scanner that checks any site, link, or URL for malware, viruses, blacklist status, seo spam,.

Cost: Free Access: Open Source