News Feed

CISA Alerts

CIS Advisors

Department of Defense

Passive

Shodan

Web application security research, including the OWASP Top 10 vulnerabilities.

Censys

Security best practices, benchmarks, and compliance tools for organizations.

Whois

Cyber risk research and incident response methodologies.

Nslookup / Dig

Cloud security best practices and compliance frameworks.

DNS Dumpster

Cybersecurity training, certifications, and research-driven threat intelligence.

Wireshark

Cybersecurity training, certifications, and research-driven threat intelligence.

Spokeo

Cloud security best practices and compliance frameworks.

TruffleHog

Cybersecurity training, certifications, and research-driven threat intelligence.

theHarvester

Cybersecurity training, certifications, and research-driven threat intelligence.

Recon-ng

Cloud security best practices and compliance frameworks.

Maltego

Cloud security best practices and compliance frameworks.

FOCA

Security best practices, benchmarks, and compliance tools for organizations.

Active

Ping / Traceroute

Web application security research, including the OWASP Top 10 vulnerabilities.

Nmap

Security best practices, benchmarks, and compliance tools for organizations.

Netcat

Cyber risk research and incident response methodologies.

Telnet

Cloud security best practices and compliance frameworks.

Metasploit

Cybersecurity training, certifications, and research-driven threat intelligence.

e

Cybersecurity training, certifications, and research-driven threat intelligence.

VirusTotal

Scans suspicious files and URLs using multiple antivirus engines.

Shodan

Search engine for internet-exposed devices, useful for reconnaissance and attack surface mapping.

Censys

Used for scanning and analyzing internet-connected assets.

Intelligence X

OSINT search engine for leaked data, dark web content, and public records.

ThreatMiner

An OSINT platform for researching indicators of compromise (IOCs) and cyber threat intelligence.

PhishTool

A platform for analyzing and detecting phishing threats.

CVE Details

Searchable database of known vulnerabilities (CVEs) with exploit and patch details.

AlienVault OTX

Community-driven platform for sharing cyber threat intelligence and attack trends.

Cyber Threat Watch

A real-time monitoring tool providing insights on emerging cyber threats and vulnerabilities.

ATT&CK Framework

A knowledge base of real-world adversary tactics and techniques.

ATT&CK Groups

Activity clusters tracked by common names in the security community.

ATT&CK Data & Tools

Resources to explore, visualize, and query ATT&CK intelligence.

Cyber Analytics Repository

A database of security analytics based on ATT&CK, with implementations for tools like Splunk and EQL.

Engage

A framework for planning adversary engagement operations.

D3FEND

A knowledge graph of cybersecurity countermeasures.

Emulation Plans

Step-by-step guides to mimic threat groups like APT3, APT29, and FIN6 for security testing.

ChatGPT

A knowledge base of real-world adversary tactics and techniques.

Google Gemini

Activity clusters tracked by common names in the security community.

DALL-E 3

Resources to explore, visualize, and query ATT&CK intelligence.

N8N

A database of security analytics based on ATT&CK, with implementations for tools like Splunk and EQL.

IFTTT

A framework for planning adversary engagement operations.

GitHub Copilot

A knowledge graph of cybersecurity countermeasures.

Elicit

Step-by-step guides to mimic threat groups like APT3, APT29, and FIN6 for security testing.

Wireshark

Packet analyzer for inspecting network traffic in real time.

Nmap

A powerful network scanner for discovering hosts, services, and vulnerabilities.

OpenVAS

An open-source vulnerability scanner for detecting security weaknesses.

Nikto

A web server scanner that detects vulnerabilities, misconfigurations, and outdated software.

Metasploit

A penetration testing framework for exploiting vulnerabilities and testing security defenses.

Kali Linux

Penetration testing OS with pre-installed security and hacking tools.

Parrot Security OS

Security-focused Linux distribution for penetration testing and forensics.

Burp Suite

Web application security testing tool for detecting vulnerabilities like XSS and SQL injection.

Hydra

Fast brute-force tool for attacking login credentials across various services.

Snort

Popular IDS/IPS for analyzing and blocking network-based threats.

Openwall

Develops open-source security tools (John the Ripper, yescrypt, etc…)

Aircrack-ng

A suite of tools for assessing Wi-Fi network security.

Note Database