Threat Intelligence

Platforms that provide information about threats and attack vectors

6 listed tools Last update on 2025-06-12

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

AbuseIPDB 

Free   Commercial        

Community-driven IP address blacklist and threat intelligence platform for reporting and checking abusive IP activities

AlienVault OTX 

Open-access    

Open Threat Exchange platform offering community-driven threat intelligence with real-time indicators of compromise (IoCs)

Cisco Talos 

Free            

Threat intelligence and research division of Cisco, providing real-time protection and insights into global cyber threats

Cloudflare Radar 

Free    

Internet intelligence platform offering real-time insights into global traffic, security threats, protocol adoption, and DNS trends

Hudson Rock 

Free   Commercial            

Cybercrime intelligence platform specializing in infostealer malware data to detect and mitigate compromised credentials

ThreatBook 

Free   Commercial    

Cyber threat intelligence platform offering high-fidelity, actionable insights for detection, response, and protection