Platforms that provide information about threats and attack vectors
6 listed tools Last update on 2025-06-12
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Free Commercial
Community-driven IP address blacklist and threat intelligence platform for reporting and checking abusive IP activities
Open-access
Open Threat Exchange platform offering community-driven threat intelligence with real-time indicators of compromise (IoCs)
Free
Threat intelligence and research division of Cisco, providing real-time protection and insights into global cyber threats
Free
Internet intelligence platform offering real-time insights into global traffic, security threats, protocol adoption, and DNS trends
Free Commercial
Cybercrime intelligence platform specializing in infostealer malware data to detect and mitigate compromised credentials
Free Commercial
Cyber threat intelligence platform offering high-fidelity, actionable insights for detection, response, and protection