Apps with 'threat intelligence' feature

All apps in Apps with 'threat intelligence' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. VirusTotal icon
     516 likes

    Inspects files, domains, IPs, and URLs with 70+ scanners, sharing results with the security community. Free for end-users for non-commercial use.

    • Anti-Virus App
    • Free PersonalProprietary
    • Mac
    • Windows
    • Linux
    • Online
    • Microsoft Edge
    • Google Chrome
    • Software as a Service (SaaS)
    • Mozilla Firefox
    Scan results for alternativeto.net
    45 alternatives
    4.5
    Excellent22 reviews
  2. urlscan.io icon
     12 likes

    urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates.

    • FreemiumProprietary
    • Online
    • Google Chrome
    • Mozilla Firefox
    Front page
    71 alternatives
  3. Graylog icon
     42 likes

    Graylog is a powerful Security Information and Event Management (SIEM) solution offering a robust log analytics platform that simplifies the collection, search, analysis, and alerting of all types of machine-generated data.

    Graylog screenshot 1
  4. DeHashed icon
     21 likes

    DeHashed is the largest & fastest data breach search engine. You can search for IP address, email, username, name, phone, VIN, address, and more! We have true wild card, dork usage, and we offer a real search engine experience! It's also free!.

    DeHashed screenshot 1
    24 alternatives
  5. ANY.RUN icon
     18 likes

    ANY.RUN is interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. ANY.RUN's threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

    ANY.RUN screenshot 1
    35 alternatives
  6. Malcat icon
     8 likes

    Malcat is a feature-rich hexadecimal editor / disassembler / decompiler for reverse engineers and malware analysts. It has support for many file formats and CPUs, can scan for signatures, decrypt/decompress data, diff files and run python scripts.

    Malcat screenshot 1
    29 alternatives
  7. AbuseIPDB icon
     4 likes

    AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

    • FreemiumProprietary
    • Online
    AbuseIPDB screenshot 1
    39 alternatives
  8. LeakRadar.io icon
     1 like

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.

    LeakRadar.io screenshot 1
    8 alternatives
  9. MISP icon
     1 like

    MISP (core software) - Open Source Threat Intelligence and Sharing Platform.

    • FreeOpen Source
    • Linux
    MISP screenshot 1
    3 alternatives
  10. Vulmon Alerts icon
     2 likes

    Vulmon Alerts is how you proactively detect vulnerabilities. Subscribe to any query related to vulnerabilities and get alerted before hackers. Integrate vulnerability intelligence into your vulnerability management process.

    Vulmon Alerts screenshot 1
    33 alternatives
  11. Linkurious icon
     9 likes

    Linkurious provides a graph visualization and analysis platform used for fraud detection, anti-money laundering, intelligence or cybersecurity. Easy to deploy and highly extensible, Linkurious Enterprise makes it easy to uncover insights hidden in complex connected data.

    • PaidProprietary
    • Online
    Explore and make sense of graph data through Linkurious Enterprise simple web-based interface.
    44 alternatives
  12. Siren.io icon
     4 likes

    Siren is an all-in-one investigation platform that safeguards people, assets, and networks by integrating data from open sources, vendors, and classified channels.

    • PaidProprietary
    • Mac
    • Windows
    • Linux
    • elasticsearch
    Siren 14's new automatic investigation (graph) generator, creating an exhaustive search on all available data sources and creating connections in your data
    22 alternatives
  13. Hudson Rock icon
     1 like

    With expertise developed at the cybercrime intelligence division at the prestigious 8200 cyber unit at the IDF, Hudson Rock’s powerful cybercrime threat intelligence feed provides invaluable data for infrastructure protection, end-user protection, and supply chain risk...

    This is the overview page of the results for disney.com indicating the company has compromised employees & clients
    20 alternatives
  14. alphaMountain icon
     4 likes

    Security vendors and organizations use alphaMountain's domain and IP threat intelligence data to make their security products and programs more secure. By leveraging the latest in machine learning algorithms and artificial intelligence, alphaMountain instantly classifies any...

    threatYeti URL scan showing high risk site.
    8 alternatives
  15. Ipregistry icon
     5 likes

    Ipregistry is an IP geolocation and threat data API. People use Ipregistry to personalize content, analyze traffic, enrich forms, target ads, enforce GDPR compliance, perform redirections, block countries but also prevent free trial abuse by detecting and blocking Proxy and Tor...

    • FreemiumOpen Source
    • Self-Hosted
    • Software as a Service (SaaS)
    Ipregistry screenshot 1
    15 alternatives
  16. DarkInvader  icon
     1 like

    DarkInvader is an external attack surface intelligence platform, that collect threat intelligence across the dark and surface web, helping to identify threat vectors that exist across in your attack surface.

    • PaidProprietary
    • Online
    Main Dashboard
    17 alternatives
  17. Sayari icon
     1 like

    Sayari builds search products to find corporate, financial & public records in hard-target countries, covering emerging, frontier & offshore financial center markets, corporate registries, official gazettes, litigation, vital records, customs data.

    Sayari screenshot 1
    4 alternatives
  18. OpenCTI icon
     Like

    Collect, correlate and leverage. Organize your cyber threat intelligence to enhance and disseminate actionable insights.

    • FreeOpen Source
    • Self-Hosted
    OpenCTI screenshot 1
    2 alternatives
  19. Pithus icon
     Like

    Pithus is a free and open-source mobile threat intelligence platform for activists, journalists, NGOs, researchers…

    • FreeOpen Source
    • Online
    Pithus screenshot 1
  20. VerifiedThreat is an AI-driven threat and vulnerability platform originally designed for governments and sovereign nations. It simulates state-sponsored red team attacks on critical infrastructure, national security assets, and enterprise systems for corporate clients.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    VerifiedThreat Alerting KPIs
  21. PhishFeed icon
     Like

    The PhishFeed API puts attack details right at your fingertips, making it easier to identify threats and enabling faster brand protection.

    • PaidProprietary
    • Online
    7 alternatives