Apps with 'threat intelligence' feature

All apps in Apps with 'threat intelligence' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. VirusTotal icon
     516 likes

    Inspects files, domains, IPs, and URLs with 70+ scanners, sharing results with the security community. Free for end-users for non-commercial use.

    Cost / License

    • Free Personal
    • Proprietary

    Platforms

    • Mac
    • Windows
    • Linux
    • Online
    • Microsoft Edge
    • Google Chrome
    • Software as a Service (SaaS)
    • Mozilla Firefox
    Scan results for alternativeto.net
    the macOS/Linux desktop uploader
    the VT4Browsers Firefox extension
    +1
    Home
    45 alternatives
    4.5
    Excellent22 reviews
  2. urlscan.io icon
     12 likes

    urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Google Chrome
    • Mozilla Firefox
    Front page
    Scanning
    Results in detail
    +1
    DOM tree
    71 alternatives
  3. Graylog icon
     42 likes

    Graylog is a powerful Security Information and Event Management (SIEM) solution offering a robust log analytics platform that simplifies the collection, search, analysis, and alerting of all types of machine-generated data.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Self-Hosted
    • Online
    • Software as a Service (SaaS)
    Graylog screenshot 1
    Graylog screenshot 1
    Graylog screenshot 2
    +3
    Graylog screenshot 3
  4. ANY.RUN icon
     18 likes

    ANY.RUN is interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. ANY.RUN's threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    ANY.RUN screenshot 1
    ANY.RUN screenshot 1
    ANY.RUN screenshot 2
    +1
    ANY.RUN screenshot 3
    35 alternatives
  5. Malcat icon
     8 likes

    Malcat is a feature-rich hexadecimal editor / disassembler / decompiler for reverse engineers and malware analysts. It has support for many file formats and CPUs, can scan for signatures, decrypt/decompress data, diff files and run python scripts.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Windows
    • Linux
    Malcat screenshot 1
    Malcat screenshot 1
    Malcat screenshot 2
    +4
    Malcat screenshot 3
    29 alternatives
  6. AbuseIPDB icon
     4 likes

    AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    AbuseIPDB screenshot 1
    AbuseIPDB screenshot 1
    AbuseIPDB screenshot 2
    +1
    AbuseIPDB screenshot 3
    39 alternatives
  7. DeHashed icon
     22 likes

    DeHashed is the largest & fastest data breach search engine. You can search for IP address, email, username, name, phone, VIN, address, and more! We have true wild card, dork usage, and we offer a real search engine experience! It's also free!.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    DeHashed screenshot 1
    24 alternatives
  8. Hudson Rock icon
     2 likes

    With expertise developed at the cybercrime intelligence division at the prestigious 8200 cyber unit at the IDF, Hudson Rock’s powerful cybercrime threat intelligence feed provides invaluable data for infrastructure protection, end-user protection, and supply chain risk...

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    This is the overview page of the results for disney.com indicating the company has compromised employees & clients
    External attack surface on trendmicro.com
    Technology discovery feature, query any technology and discover companies using that technology
    +1
    Compromised employees of disney.com shown in Bayonet
    20 alternatives
  9. LeakRadar.io icon
     1 like

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    LeakRadar.io screenshot 1
    8 alternatives
  10. Vulmon Alerts icon
     2 likes

    Vulmon Alerts is how you proactively detect vulnerabilities. Subscribe to any query related to vulnerabilities and get alerted before hackers. Integrate vulnerability intelligence into your vulnerability management process.

    Cost / License

    Application type

    Platforms

    • Online
    • Software as a Service (SaaS)
    Vulmon Alerts screenshot 1
    34 alternatives
  11. Linkurious icon
     9 likes

    Linkurious provides a graph visualization and analysis platform used for fraud detection, anti-money laundering, intelligence or cybersecurity. Easy to deploy and highly extensible, Linkurious Enterprise makes it easy to uncover insights hidden in complex connected data.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    Explore and make sense of graph data through Linkurious Enterprise simple web-based interface.
    Unveil hidden connections within your data.
    44 alternatives
  12. Siren.io icon
     4 likes

    Siren is an all-in-one investigation platform that safeguards people, assets, and networks by integrating data from open sources, vendors, and classified channels.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Mac
    • Windows
    • Linux
    • elasticsearch
    Siren 14's new automatic investigation (graph) generator, creating an exhaustive search on all available data sources and creating connections in your data
    Siren simple search, no graph needed for basic entity searches. Can be used by anyone in the organisation. No training needed.
    22 alternatives
  13. CyberGordon icon
     1 like

    CyberGordon quickly provides you threat and risk information about observables like IP address or domain.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    CyberGordon screenshot 1
    5 alternatives
  14. alphaMountain icon
     4 likes

    Security vendors and organizations use alphaMountain's domain and IP threat intelligence data to make their security products and programs more secure. By leveraging the latest in machine learning algorithms and artificial intelligence, alphaMountain instantly classifies any...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    • Software as a Service (SaaS)
    threatYeti URL scan showing high risk site.
    8 alternatives
  15. SecAI.ai icon
     1 like

    SecAI serves as an AI-powered security analysis tool free to every security analyst and security ops.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    SecAI.ai screenshot 1
    SecAI.ai screenshot 1
    SecAI.ai screenshot 2
    8 alternatives
  16. Ipregistry icon
     5 likes

    Ipregistry is an IP geolocation and threat data API. People use Ipregistry to personalize content, analyze traffic, enrich forms, target ads, enforce GDPR compliance, perform redirections, block countries but also prevent free trial abuse by detecting and blocking Proxy and Tor...

    Cost / License

    • Freemium
    • Open Source

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
    Ipregistry screenshot 1
    Ipregistry screenshot 1
    Ipregistry screenshot 2
    +2
    Ipregistry screenshot 3
    15 alternatives
  17. DarkInvader  icon
     1 like

    DarkInvader is an external attack surface intelligence platform, that collect threat intelligence across the dark and surface web, helping to identify threat vectors that exist across in your attack surface.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    Main Dashboard
    17 alternatives
  18. Sayari icon
     1 like

    Sayari builds search products to find corporate, financial & public records in hard-target countries, covering emerging, frontier & offshore financial center markets, corporate registries, official gazettes, litigation, vital records, customs data.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Sayari screenshot 1
    4 alternatives
  19. OpenCTI icon
     Like

    Collect, correlate and leverage. Organize your cyber threat intelligence to enhance and disseminate actionable insights.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Self-Hosted
    OpenCTI screenshot 1
    2 alternatives
  20. Pithus icon
     Like

    Pithus is a free and open-source mobile threat intelligence platform for activists, journalists, NGOs, researchers…

    Cost / License

    Platforms

    • Online
    Pithus screenshot 1
  21. VerifiedThreat is an AI-driven threat and vulnerability platform originally designed for governments and sovereign nations. It simulates state-sponsored red team attacks on critical infrastructure, national security assets, and enterprise systems for corporate clients.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    VerifiedThreat Alerting KPIs
  22. PhishFeed icon
     Like

    The PhishFeed API puts attack details right at your fingertips, making it easier to identify threats and enabling faster brand protection.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    7 alternatives