forked from ARPSyndicate/awesome-intelligence
-
Notifications
You must be signed in to change notification settings - Fork 0
/
intel.json
2687 lines (2687 loc) · 153 KB
/
intel.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
[
{
"title": "CVEMON",
"social": ["https://twitter.com/scanfactory_io", "https://www.linkedin.com/company/scanfactory-io"],
"description": "CVE Exploits Search Utility",
"link": "https://in.scanfactory.io/cvemon.html",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "Subdomain Center",
"social": ["https://twitter.com/scanfactory_io", "https://www.linkedin.com/company/scanfactory-io"],
"description": "ARPSyndicate's Subdomain Center API",
"link": "https://www.subdomain.center",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "BBR Dataset",
"social": ["https://twitter.com/scanfactory_io", "https://www.linkedin.com/company/scanfactory-io/"],
"description": "Recon data for public bug bounty programs.",
"link": "https://mega.nz/folder/KXJyQKSA#pRHtZzEO4mxqKDgfzNK8iA",
"region": "GLOBAL",
"tags": "network,web"
},
{
"title": "Shodan",
"social": ["https://twitter.com/shodanhq","https://mastodon.shodan.io", "https://www.facebook.com/shodan.io", "https://www.linkedin.com/company/shodan"],
"description": "Search Engine that lets users search for various types of servers connected to the internet using a variety of filters.",
"link": "https://shodan.io",
"region": "GLOBAL",
"tags": "web,network,vulnerability,image"
},
{
"title": "ZieTRAD Forecast",
"description": "Stock, Crypto, Commodity, Index & Currency Forecasts.",
"link": "https://forecast.zietrad.app",
"region": "GLOBAL",
"tags": "stocks,crypto,economics"
},
{
"title": "ZieTRAD Trends",
"description": "Popular Trends based on the News of Global Markets.",
"link": "https://trends.zietrad.app",
"region": "GLOBAL",
"tags": "stocks,crypto,economics"
},
{
"title": "Chaos Dataset",
"social": ["https://twitter.com/pdiscoveryio"],
"description": "This project is meant to enhance research and analyse changes around DNS for better insights.",
"link": "https://chaos.projectdiscovery.io",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "Censys Search",
"social": ["https://twitter.com/censysio"],
"description": "Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.",
"link": "https://search.censys.io",
"region": "GLOBAL",
"tags": "web,network"
},
{
"title": "NerdyData",
"social": ["https://twitter.com/nerdydata"],
"description": " Get a list of websites that use certain technologies, plus their company and spend data. Perfect for lead generation, market analysis, and competitive research.",
"link": "https://www.nerdydata.com",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "PublicWWW",
"description":"Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.",
"link": "https://publicwww.com",
"region": "GLOBAL",
"tags": "web,code"
},
{
"title": "SearchCode",
"social": ["https://twitter.com/boyter"],
"description": "Search 75 billion lines of code from 40 million projects",
"link": "https://searchcode.com",
"region": "GLOBAL",
"tags": "code"
},
{
"title": "SimilarSites",
"social": ["https://twitter.com/similarsites"],
"description": "Easily Explore alternative websites",
"link": "https://www.similarsites.com",
"region": "GLOBAL",
"tags": "web,image"
},
{
"title": "Netlas",
"social": ["https://twitter.com/netlas_io"],
"description": "Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.",
"link": "https://netlas.io",
"region": "GLOBAL",
"tags": "web,network,vulnerability"
},
{
"title": "CriminalIP",
"social": ["https://twitter.com/CriminalIP_US", "https://www.linkedin.com/company/aispera", "https://www.youtube.com/channel/UCa_xzwKO-qy2MZgDXi7-tnw"],
"description": "Search for information on anything connected to public internet",
"link": "https://www.criminalip.io",
"region": "GLOBAL",
"tags": "web,network,vulnerability,image"
},
{
"title": "Kaspersky OpenTIP",
"social": ["https://twitter.com/kaspersky"],
"description": "Kaspersky Threat Intelligence Portal allows you to scan files, domains, IP addresses, and URLs for threats, malware, viruses.",
"link": "https://opentip.kaspersky.com",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "GreyNoise",
"social": ["https://twitter.com/GreyNoiseIO"],
"description": "GreyNoise captures data on IPs that scan the internet and saturate security tools with internet noise, so SOC teams can focus on threats that matter and ignore those that don't.",
"link": "https://www.greynoise.io",
"region": "GLOBAL",
"tags": "web,malware,network"
},
{
"title": "Intezer Analyze",
"social": ["https://twitter.com/IntezerLabs"],
"description": "Malware analysis platform quickly classifying malware and unknown files. Unlike Antivirus and EDRs which mostly produce generic results (think “Trojan.Generic”) and can only classify specific hashes, Intezer analyzes the code itself in order to categorize the threat and classify variants from the same malware family.",
"link": "https://analyze.intezer.com",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Arkham Intelligence",
"social": ["https://twitter.com/ArkhamIntel"],
"description": "Powerful tools for linking cryptocurrency activity to real world individuals and institutions.",
"link": "https://www.arkhamintelligence.com",
"region": "GLOBAL",
"tags": "crypto"
},
{
"title": "AlienVault OTX",
"description": "A Threat data platform that allows security researchers and threat data producers to share research and investigate new threats.",
"link": "https://otx.alienvault.com",
"region": "GLOBAL",
"tags": "malware,network,web"
},
{
"title": "ExploitDB",
"social": ["https://twitter.com/exploitdb", "https://www.facebook.com/ExploitDB"],
"description": "An archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.",
"link": "https://www.exploit-db.com",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "WhatsMyName",
"description": "This tool allows you to enumerate usernames across many websites.",
"link": "https://whatsmyname.app",
"region": "GLOBAL",
"tags": "social"
},
{
"title": "Dehashed",
"description": "DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine to help secure accounts and provide insight on compromised assets.",
"link": "https://dehashed.com",
"region": "GLOBAL",
"tags": "breach"
},
{
"title": "ManyPasswords",
"description": "Default passwords for IoT devices and for web applications (for ex. MySQL and PostgreSQL admin panels)",
"link": "https://github.com/many-passwords/many-passwords",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "BrandDB",
"description": "Perform a trademark search by text or image in brand data from multiple national and international sources, including trademarks, appellations of origin and official emblems.",
"link": "https://branddb.wipo.int",
"region": "GLOBAL",
"tags": "company"
},
{
"title": "DNS History",
"social": ["https://www.facebook.com/DnsHistory"],
"description": "Domain Name System (DNS) Historical Record Archive",
"link": "http://dnshistory.org",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "The World Factbook",
"social": ["https://twitter.com/cia","https://www.facebook.com/Central.Intelligence.Agency", "https://www.instagram.com/cia", "https://www.linkedin.com/company/central-intelligence-agency"],
"description": "The World Factbook provides basic intelligence on the history, people, government, economy, energy, geography, environment, communications, transportation, military, terrorism, and transnational issues for 266 world entities.",
"link": "https://www.cia.gov/the-world-factbook",
"region": "GLOBAL",
"tags": "geopolitics,terrorism,economics"
},
{
"title": "Global Terrorism Catalogue",
"social": ["https://github.com/klapeye"],
"description": "Catalogue of Terrorist Incidents occurred globally since 1968.",
"link": "https://www.kaggle.com/datasets/klapeyefoundation/global-terrorism",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "Ransom Wiki",
"social": ["https://twitter.com/S0ufi4n3", "https://www.linkedin.com/in/soufianetahiri"],
"description": "Check if your company or partner appears in a claimed ransom attack breach.",
"link": "https://ransom.wiki",
"region": "GLOBAL",
"tags": "breach"
},
{
"title": "Xlocate",
"social": ["https://twitter.com/scanfactory_io"],
"description": "The ultimate exploits/references finder",
"link": "https://github.com/ARPSyndicate/xlocate",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "Public Intelligence",
"social": ["https://twitter.com/publicintel"],
"description": "Public Intelligence is an international, collaborative research project aimed at aggregating the collective work of independent researchers around the globe who wish to defend the public's right to access information.",
"link": "https://publicintelligence.net",
"region": "GLOBAL",
"tags": "geopolitics"
},
{
"title": "Intelligence Briefs",
"social": ["https://twitter.com/CTNSIS","https://www.facebook.com/CTNSIS"],
"description": "Strategic Intelligence News publishes intelligence reports, geopolitics, military intelligence, and crime reports analysis.",
"link": "https://intelligencebriefs.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism,crimes"
},
{
"title": "RAND Corporation",
"social": ["https://www.youtube.com/user/TheRANDCorporation","https://www.facebook.com/RANDCorporation", "https://twitter.com/randcorporation", "https://www.instagram.com/randcorporation", "https://www.linkedin.com/company/rand-corporation"],
"description": "The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest.",
"link": "https://www.rand.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "ProjectDiscovery",
"social": ["https://twitter.com/pdiscoveryio"],
"description": "An open-source software company that builds tools to detect and remediate vulnerabilities from development to production.",
"link": "https://github.com/projectdiscovery",
"region": "GLOBAL",
"tags": "network,web,exploit,vulnerability"
},
{
"title": "BeVigil",
"social": ["https://twitter.com/cloudsek"],
"description": "The internet's first and only security search engine for mobile apps.",
"link": "https://bevigil.com",
"region": "GLOBAL",
"tags": "network,vulnerability"
},
{
"title": "CINS Army List",
"description": "CINS Army shares valuable threat intelligence harvested from their CINS system. The CINS Army list is a subset of the CINS Active Threat Intelligence ruleset, and consists of IP addresses having poor recent Rogue Packet score factor or have tripped a designated number of trusted alerts across a given number of their Sentinels deployed around the world.",
"link": "http://cinsscore.com/#list",
"region": "GLOBAL",
"tags": "malware,network"
},
{
"title": "Umbrella List",
"description": "The popularity list contains most queried domains based on passive DNS usage across Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries.",
"link": "http://s3-us-west-1.amazonaws.com/umbrella-static/index.html",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "MalwareBazaar",
"social": ["https://twitter.com/abuse_ch"],
"description": "MalwareBazaar is a project from abuse.ch with the goal of sharing malware samples with the infosec community, AV vendors and threat intelligence providers.",
"link": "https://bazaar.abuse.ch",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "BD Banlist",
"description": "Binary Defense Systems Artillery Threat Intelligence Feed and Banlist Feed",
"link": "https://www.binarydefense.com/banlist.txt",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "AbuseIPDB",
"social": ["https://twitter.com/abuseIPDB"],
"description": "AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.",
"link": "https://www.abuseipdb.com",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Yara Rules",
"social": ["https://twitter.com/yararules"],
"description": "This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules.",
"link": "https://github.com/Yara-Rules/rules",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "CrowdSec",
"social": ["https://twitter.com/crowd_security", "https://fr.linkedin.com/company/crowdsec", "https://www.youtube.com/channel/UCKhMjrV_Y2ws3gTW-SsxFkA"],
"description": "CrowdSec is an open-source and collaborative security stack leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Gain crowd-sourced protection against malicious IPs. Benefit from the most accurate CTI in the world.",
"link": "https://www.crowdsec.net",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Botvrij",
"social": ["https://www.twitter.com/cudeso"],
"description": "Botvrij provides different sets of open source IOCs that you can use in your security devices to detect possible malicious activity. The information contains network info (IPs), file hashes, file paths, domain names, URLs.",
"link": "https://www.botvrij.eu",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "BGP Ranking",
"social": ["https://github.com/D4-project"],
"description": "BGP Ranking is a free software to calculate the security ranking of Internet Service Providers. The system is gathering external datasources (e.g. dshield, shadowserver, Arbor ATLAS) in order to evaluate the ranking over time.",
"link": "https://bgpranking.circl.lu",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "War on the Rocks",
"social": ["https://twitter.com/warontherocks"],
"description": "War on the Rocks is a platform for analysis and debate on strategy, defense, and foreign affairs. It features articles and podcasts produced by an array of writers with deep experience in these matters: top notch scholars who study war, those who have served or worked in war zones, and more than a few who have done it all.",
"link": "https://warontherocks.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "NOC DNSRepo",
"description": "Search NOC's DNS repository of IP addresses, domains, and their records. You can search for domains behind an IP address, or all sub domains for a specific domain. You can also do sub domain discovery, find domains behind a specific service and much more.",
"link": "https://dnsrepo.noc.org",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "IntelligenceX",
"social": ["https://twitter.com/_IntelligenceX"],
"description": "IntelligenceX delivers fast, high-quality results and make the deepest parts of the internet accessible with a few clicks. It searches billions of selectors in a matter of milliseconds. The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc. It searches in places such as the darknet, document sharing platforms, whois data, public data leaks and others. It keeps a historical data archive of results, similar to how the Wayback Machine from archive.org stores historical copies of websites.",
"link": "https://intelx.io",
"region": "GLOBAL",
"tags": "crypto,network,breach,web,tor"
},
{
"title": "DefaultCreds",
"description": "One place for all the default credentials",
"link": "https://github.com/ihebski/DefaultCreds-cheat-sheet",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "PayloadAllTheThings",
"social": ["https://twitter.com/pentest_swissky"],
"description": "A list of useful payloads and bypass for Web Application Security and Pentest/CTF.",
"link": "https://github.com/swisskyrepo/PayloadsAllTheThings",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "HardwareAllTheThings",
"social": ["https://twitter.com/pentest_swissky"],
"description": "A list of useful payloads and bypasses for Hardware and IOT Security.",
"link": "https://github.com/swisskyrepo/HardwareAllTheThings",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "Metabigor",
"social": ["https://twitter.com/j3ssiejjj", "https://twitter.com/OsmedeusEngine"],
"description": "Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key.",
"link": "https://github.com/j3ssie/metabigor",
"region": "GLOBAL",
"tags": "network,web"
},
{
"title": "OSINT Curious",
"description": "The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, blogs, instructional videos, online Discord community, and live streams.",
"link": "https://www.youtube.com/@OSINTCurious",
"region": "GLOBAL",
"tags": "social,network,crypto,geopolitics,web,tor"
},
{
"title": "Benjamin Strick",
"social": ["https://www.youtube.com/@Bendobrown","https://twitter.com/BenDoBrown", "https://www.facebook.com/profile.php?id=100088570576178","https://linkedin.com/in/bends"],
"description": "Benjamin Strick creates digital research tutorials and videos for this web generation on Open Source Intelligence (OSINT), digital research, geolocation and curious bytes so that no matter who you are, or where you are in the world, you can learn how to identify, verify and analyse information online.",
"link": "https://benjaminstrick.com",
"region": "GLOBAL",
"tags": "individual"
},
{
"title": "Counter Extremism",
"description": "The Counter Extremism Project (CEP) is a not-for-profit, non-partisan, international policy organization formed to combat the growing threat from extremist ideologies. It strives to build and maintain its best-in-class research and analysis databases on extremist groups, including their ideology, leaders, history, financing, violent activities, tactics, and rhetoric.",
"link": "https://www.counterextremism.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "McKinsey Insights",
"social": ["https://twitter.com/mckonfinance", "https://twitter.com/McKStrategy"],
"description": "Critical trends and risks in the global economy",
"link": "https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/mckinsey-global-economics-intelligence",
"region": "GLOBAL",
"tags": "economics"
},
{
"title": "Economist Intelligence",
"social": ["https://www.linkedin.com/company/the-economist-intelligence-unit", "https://twitter.com/theeiu", "https://www.youtube.com/user/eiumedia", "http://facebook.com/TheEIU"],
"description": "Stay current on important trending topics that impact business decisions through EIU curated set of global themes which range from climate change to Covid-19 and digital payments. Learn how global issues are impacting various industries and markets today.",
"link": "https://www.eiu.com/n/global-themes",
"region": "GLOBAL",
"tags": "economics"
},
{
"title": "Quiver Quant",
"social": ["https://twitter.com/QuiverQuant", "https://www.instagram.com/quiverquantitative"],
"description": "Quiver scrapes alternative stock data from across the internet and aggregates it in a free, easy-to-use web dashboard. It allows retail investors to tap into the power of big data, and have access to actionable, easy to interpret data that hasn't already been dissected by Wall Street.",
"link": "https://www.quiverquant.com",
"region": "GLOBAL",
"tags": "stocks"
},
{
"title": "MITRE ATT&CK",
"social": ["https://twitter.com/MITREattack"],
"description": "MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.",
"link": "https://attack.mitre.org",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Exploit Alert",
"description": "Exploits found on the INTERNET",
"link": "https://www.exploitalert.com",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "XSS Payloads",
"description": "The wonderland of JavaScript unexpected usages, and more.",
"link": "http://www.xss-payloads.com",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "LOLBAS",
"description": "The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.",
"link": "https://lolbas-project.github.io",
"region": "GLOBAL",
"tags": "exploit,malware,vulnerability"
},
{
"title": "GTFOBins",
"description": "GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.",
"link": "https://gtfobins.github.io",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "0day Today",
"social": ["https://twitter.com/Inj3ct0r","https://www.facebook.com/Inj3ct0rs"],
"description": "0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.",
"link": "https://0day.today",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "Rapid7 DB",
"social": ["https://twitter.com/Rapid7", "https://www.facebook.com/rapid7", "https://www.instagram.com/rapid7", "https://www.linkedin.com/company/39624"],
"description": "Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review.",
"link": "https://www.rapid7.com/db",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "Sploitus",
"social": ["https://twitter.com/sploitus_com"],
"description": "Sploitus is a convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities. The search engine is also a good resource for finding security and vulnerability discovery tools.",
"link": "https://sploitus.com",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "TOR Link",
"social": ["https://twitter.com/TorDotLink", "https://www.facebook.com/tordotlink", "https://www.instagram.com/tordotlink"],
"description": "Free anonymous deepweb / darknet search engine",
"link": "https://tor.link",
"region": "GLOBAL",
"tags": "tor"
},
{
"title": "Rescure",
"social": ["https://github.com/Fruxlabs"],
"description": "Enhance your cyber security capabilities with highly tailored, accurate and relevant threat intelligence which integrates seamlessly with your detection workflows.",
"link": "https://rescure.me/feeds.html",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Feodo Tracker",
"social": ["https://twitter.com/abuse_ch"],
"description": "Browse the list of botnet Command&Control servers (C&Cs) tracked by Feodo Tracker, associated with Dridex, TrickBot, QakBot (aka QuakBot/Qbot), BazarLoader (aka BazarBackdoor) and Emotet (aka Heodo).",
"link": "https://feodotracker.abuse.ch",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Stored Website",
"social": ["https://twitter.com/shapito27"],
"description": "View cached web pages/website",
"link": "https://stored.website",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "ThreatMiner",
"social": ["https://twitter.com/ThreatMiner","https://www.linkedin.com/company/threatminer"],
"description": "ThreatMiner is a threat intelligence portal that provides information on indicators of compromise (IOC) such as domains, IP address, malware samples (MD5, SHA1 and SHA256), SSL certificates, WHOIS information and malicious URLs such as phishing and malware links.",
"link": "https://www.threatminer.org",
"region": "GLOBAL",
"tags": "malware,network,web"
},
{
"title": "YARAify",
"social": ["https://twitter.com/abuse_ch"],
"description": "Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules.With YARAhub, the platform also provides a structured way for sharing YARA rules with the community.",
"link": "https://yaraify.abuse.ch",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "PulseDive",
"social": ["https://twitter.com/pulsedive"],
"description": "Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own.",
"link": "https://pulsedive.com",
"region": "GLOBAL",
"tags": "malware,network,web"
},
{
"title": "ThreatFox",
"social": ["https://twitter.com/abuse_ch"],
"description": "Browse the Indicator Of Compromise (IOC) database of ThreatFox",
"link": "https://threatfox.abuse.ch",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Breach Directory",
"description": "Check if your information was exposed in a data breach",
"link": "https://breachdirectory.org",
"region": "GLOBAL",
"tags": "breach"
},
{
"title": "Have I Been Pwned",
"social": ["https://twitter.com/haveibeenpwned","https://twitter.com/troyhunt","https://www.facebook.com/haveibeenpwned","https://www.facebook.com/troyahunt"],
"description": "Check if your email or phone is in a data breach",
"link": "https://haveibeenpwned.com",
"region": "GLOBAL",
"tags": "breach"
},
{
"title": "DNSViz",
"social": ["https://github.com/dnsviz"],
"description": "DNSViz is a tool for visualizing the status of a DNS zone. It was designed as a resource for understanding and troubleshooting deployment of the DNS Security Extensions (DNSSEC). It provides a visual analysis of the DNSSEC authentication chain for a domain name and its resolution path in the DNS namespace, and it lists configuration errors detected by the tool.",
"link": "https://dnsviz.net",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "DNS Twister",
"social": ["https://twitter.com/dnstwister", "https://www.linkedin.com/in/elceef", "https://github.com/elceef", "https://linkedin.com/in/elceef"],
"description": "The anti-phishing domain name search engine and DNS monitoring service",
"link": "https://dnstwister.report",
"region": "GLOBAL",
"tags": "malware,network"
},
{
"title": "DNSdumpster",
"social": ["https://twitter.com/hackertarget"],
"description": "DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.",
"link": "https://dnsdumpster.com",
"region": "GLOBAL",
"tags": "network"
},
{
"title": "SpyOnWeb",
"description": "SpyOnWeb takes the information from public sources, then structure it for your quick and convenient search for the websites that probably belong to the same owner.",
"link": "https://spyonweb.com",
"region": "GLOBAL",
"tags": "web,network"
},
{
"title": "Yark",
"description": "Yark lets you continuously archive all videos and metadata of a YouTube channel, it also lets you view your archive as a seamless offline website with history and historical statistics information.",
"link": "https://github.com/Owez/yark",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "CovertAction",
"social": ["https://twitter.com/CovertActionMag", "https://www.facebook.com/covertactionmagazine", "https://www.instagram.com/covertactionmag", "https://www.youtube.com/channel/UC-zGV4r8Dtvj6hjr65SIDyg"],
"description": "Exposing covert action since 1978.",
"link": "https://covertactionmagazine.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "Trellix Research",
"social": ["https://twitter.com/Trellix", "https://www.facebook.com/TeamTrellix", "https://www.linkedin.com/company/trellixsecurity"],
"description": "The latest cybersecurity trends, best practices, security vulnerabilities, and more from Trellix/Fireeye.",
"link": "https://www.trellix.com/en-us/about/newsroom/stories/research.html",
"region": "GLOBAL",
"tags": "malware,exploit,vulnerability"
},
{
"title": "CP Research",
"social": ["https://twitter.com/_cpresearch_", "https://www.facebook.com/checkpointresearch", "https://www.linkedin.com/company/check-point-software-technologies"],
"description": "Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community.",
"link": "https://research.checkpoint.com",
"region": "GLOBAL",
"tags": "malware,exploit,vulnerability"
},
{
"title": "Wikistrat",
"social": ["https://twitter.com/Wikistrat", "https://www.facebook.com/Wikistrat", "https://www.linkedin.com/company/wikistrat"],
"description": "Wikistrat is perfectly suited for collaborative analysis, strategic planning, and simulations, thanks to their ability to engage large crowds of experts to collaborate using their interactive online platform",
"link": "https://www.wikistrat.com/blog",
"region": "GLOBAL",
"tags": "geopolitics"
},
{
"title": "PolySwarm",
"social": ["https://twitter.com/PolySwarm"],
"description": "Scan Files or URLs for threats",
"link": "https://polyswarm.network",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "H1 Hacktivity",
"description": "Vulnerability Reports disclosed by Hackerone",
"link": "https://hackerone.com/hacktivity",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "WikiLeaks",
"social": ["https://twitter.com/wikileaks", "https://www.facebook.com/wikileaks"],
"description": "WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses.",
"link": "https://wikileaks.org",
"region": "GLOBAL",
"tags": "breach,geopolitics"
},
{
"title": "Talos Reports",
"social": ["https://twitter.com/talossecurity", "https://www.linkedin.com/company/cisco-talos-intelligence-group", "https://www.youtube.com/channel/UCPZ1DtzQkStYBSG3GTNoyfg"],
"description": "Vulnerability Reports disclosed by CISCO Talos",
"link": "https://talosintelligence.com/vulnerability_reports",
"region": "GLOBAL",
"tags": "exploit,vulnerability"
},
{
"title": "MalAPI",
"social": ["https://twitter.com/mrd0x"],
"description": "MalAPI maps Windows APIs to common techniques used by malware. It can be used when developing malware (for legal purposes of course) or when analyzing the source code of one.",
"link": "https://malapi.io",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "UserSearch",
"description": "Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs. 600+ sites Supported! Largest Reverse User Search Online!",
"link": "https://usersearch.org",
"region": "GLOBAL",
"tags": "social"
},
{
"title": "Domlock",
"social": ["https://twitter.com/scanfactory_io"],
"description": "Convert Domains to Netblocks & ASN",
"link": "https://github.com/ARPSyndicate/domlock",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "Rescro Sensitives",
"social": ["https://twitter.com/scanfactory_io"],
"description": "Regular Expressions for Sensitive Tokens",
"link": "https://github.com/ARPSyndicate/rescro/blob/master/signatures/sensitives.yaml",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "Favinizer",
"social": ["https://twitter.com/scanfactory_io"],
"description": "The Biggest Database of Favicon Hashes",
"link": "https://github.com/ARPSyndicate/favinizer/blob/master/favinizer.yaml",
"region": "GLOBAL",
"tags": "web"
},
{
"title": "SecureList",
"social": ["https://twitter.com/Securelist"],
"description": "The Securelist blog houses Kaspersky's threat intelligence reports, malware research, APT analysis and statistics",
"link": "https://securelist.com",
"region": "GLOBAL",
"tags": "malware,exploit,vulnerability"
},
{
"title": "SPLC Hate Map",
"social": ["https://twitter.com/splcenter", "https://www.facebook.com/SPLCenter", "https://www.instagram.com/splcenter"],
"description": "Each year since 1990, the SPLC has published an annual census of hate groups operating within the United States. The hate map, which depicts the groups' approximate locations, is the result of a year of monitoring by analysts and researchers and is typically published every January or February. It represents activity by hate groups during the previous year.",
"link": "https://www.splcenter.org/hate-map",
"region": "U.S.A.",
"tags": "geopolitics,terrorism"
},
{
"title": "ICSR",
"social": ["https://www.twitter.com/ICSR_Centre", "https://www.youtube.com/user/TheICSRBlog"],
"description": "The International Centre for the Study of Radicalisation (ICSR) is a world-class and internationally acclaimed academic research centre based in the Department of War Studies at King's College London.",
"link": "https://icsr.info",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "Militant Wire",
"social": ["https://twitter.com/MilitantWire","https://t.me/militantwire"],
"description": "Militant Wire is a media company focused on providing independent analysis of militant activity and armed conflict around the world. Our global network of researchers produces expert insight on issues of political street violence, terrorism, insurgency, organized crime, irregular warfare, and more.",
"link": "https://www.militantwire.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism,crimes"
},
{
"title": "START Publications",
"social": ["http://twitter.com/START_umd", "http://www.facebook.com/STARTConsortium/"],
"description": "Publications from a consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism.",
"link": "https://www.start.umd.edu/publications",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "SPLC Resources",
"social": ["https://twitter.com/splcenter", "https://www.facebook.com/SPLCenter", "https://www.instagram.com/splcenter"],
"description": "Search SPLC publications, cases, Extremist Files, Intelligence Project articles, and more.",
"link": "https://www.splcenter.org/resources",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "Tracking Terrorism",
"social": ["https://twitter.com/TracTerrorism"],
"description": "TRAC combines one of the world's largest databases of terrorists, terrorist groups, hate groups and their abettors with original, analytical essays on seminal terrorism topics, profiles of vulnerable regions and cities, and live feed of news and analyses.",
"link": "https://trackingterrorism.org",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "Mapping Militants",
"social": ["https://twitter.com/FSIStanford", "https://www.facebook.com/StanfordFSI", "https://www.youtube.com/channel/UCB2X9yR4GZLfrCe4jChIEwg", "https://www.instagram.com/fsi_stanford"],
"description": "The Mapping Militants Project identifies patterns in the evolution of militant organizations in specified conflict theatres and provides representations of changing relationships among groups.",
"link": "https://cisac.fsi.stanford.edu/mappingmilitants",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "NCTC Guide",
"social": ["https://www.twitter.com/odnigov", "http://www.linkedin.com/company/odni"],
"description": "NCTC serves as the primary organization in the United States Government for analyzing and integrating information pertaining to international terrorism. This Guide focuses on the international terrorist organizations that are assessed to present the most serious threats to the United States.",
"link": "https://www.dni.gov/nctc/index.html",
"region": "U.S.A.",
"tags": "terrorism"
},
{
"title": "Sekurak",
"social": ["https://twitter.com/Sekurak", "http://facebook.com/sekurak"],
"description": "News, knowledge, tools, texts - everything related to IT security",
"link": "https://sekurak.pl",
"region": "GLOBAL",
"tags": "malware,breach"
},
{
"title": "Critical Threats",
"social": ["https://twitter.com/criticalthreats", "https://www.facebook.com/criticalthreats"],
"description": "Critical Threats' objective is to inform and educate policymakers, the intelligence and military communities, and all interested citizens who need to understand the nuance and scale of threats to America's security.",
"link": "https://www.criticalthreats.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "NTI",
"social": ["https://twitter.com/nti_wmd", "https://www.facebook.com/nti.org", "https://www.instagram.com/nti_wmd", "https://www.linkedin.com/company/the-nuclear-threat-initiative", "https://www.youtube.com/channel/ucmyr23uc-vxlckdb0dtg6-a"],
"description": "NTI is a nonprofit global security organization focused on reducing nuclear and biological threats imperiling humanity.",
"link": "https://www.nti.org",
"region": "GLOBAL",
"tags": "geopolitics"
},
{
"title": "Arms Control",
"social": ["https://twitter.com/armscontrolnow", "https://www.facebook.com/armscontrol", "https://www.linkedin.com/company/armscontrol"],
"description": "Working to eliminate the threats posed by the world's most dangerous weapons",
"link": "https://www.armscontrol.org",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "ReliefWeb",
"social": ["https://twitter.com/reliefweb", "https://www.facebook.com/reliefweb", "https://www.instagram.com/reliefweb1996", "https://www.linkedin.com/company/reliefweb"],
"description": "ReliefWeb is a humanitarian information service provided by the United Nations Office for the Coordination of Humanitarian Affairs (OCHA)",
"link": "https://reliefweb.int",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "SIPRI",
"social": ["http://www.facebook.com/sipri.org", "https://www.youtube.com/user/SIPRIorg"],
"description": "Stockholm International Peace Research Institute (SIPRI) is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources.",
"link": "https://www.sipri.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "RUSI",
"social": ["https://twitter.com/RUSI_org", "https://www.facebook.com/RUSI.org", "https://www.linkedin.com/company/royal-united-services-institute", "https://www.youtube.com/user/RUSIONLINE"],
"description": "The Royal United Services Institute (RUSI) is the world's oldest and the UK's leading defence and security think tank. Our mission is to inform, influence and enhance public debate to help build a safer and more stable world.",
"link": "https://rusi.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "Conflict Arm",
"social": ["https://twitter.com/conflictarm"],
"description": "Established in 2011, Conflict Armament Research generates unique evidence on weapon supplies into armed conflicts in order to inform and support effective weapon management and control.",
"link": "https://www.conflictarm.com",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "Crisis Group",
"social": ["https://twitter.com/CrisisGroup", "https://www.facebook.com/crisisgroup", "https://www.instagram.com/crisisgroup", "https://www.linkedin.com/company/international-crisis-group", "https://www.youtube.com/user/crisisgroup"],
"description": "The International Crisis Group is an independent organisation working to prevent wars and shape policies that will build a more peaceful world. Crisis Group sounds the alarm to prevent deadly conflict.",
"link": "https://www.crisisgroup.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "OpenSanctions",
"social": ["https://twitter.com/open_sanctions"],
"description": "OpenSanctions helps investigators find leads, allows companies to manage risk and enables technologists to build data-driven products.",
"link": "https://www.opensanctions.org",
"region": "GLOBAL",
"tags": "geopolitics"
},
{
"title": "CSIS",
"social": ["https://twitter.com/csis", "https://www.facebook.com/CSIS.org", "https://www.linkedin.com/company/csis", "https://www.youtube.com/user/csisdc", "https://www.instagram.com/csis"],
"description": "The Center for Strategic and International Studies (CSIS) is a bipartisan, nonprofit policy research organization dedicated to advancing practical ideas to address the world's greatest challenges. Its purpose is to define the future of national security.",
"link": "https://www.csis.org",
"region": "GLOBAL",
"tags": "geopolitics"
},
{
"title": "Small Arms Survey",
"social": ["https://twitter.com/SmallArmsSurvey", "https://www.facebook.com/SmallArmsSurvey", "http://www.youtube.com/user/SmallArmsSurvey", "https://www.linkedin.com/company/small-arms-survey"],
"description": "For over 20 years, the Small Arms Survey has provided impartial, evidence-based, and policy-relevant knowledge on all aspects of small arms and armed violence to governments, policymakers, researchers, and civil society.",
"link": "https://www.smallarmssurvey.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "PRIO",
"social": ["https://twitter.com/PRIOresearch", "https://www.facebook.com/PRIO.org", "https://www.instagram.com/prioresearch"],
"description": "The Peace Research Institute Oslo (PRIO) conducts research on the conditions for peaceful relations between states, groups and people.",
"link": "https://www.prio.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "MILEX",
"description": "Since 1981, many countries have regularly reported their military expenditure to the United Nations. This helps enhance transparency in armaments and contributes to international security by fostering trust and confidence among countries. Access to all information from the UN Report on Military Expenditures database is now a click away.",
"link": "https://milex.un-arm.org",
"region": "GLOBAL",
"tags": "terrorism"
},
{
"title": "DataBank",
"description": "World Development Indicators (WDI) is the primary World Bank collection of development indicators, compiled from officially recognized international sources. It presents the most current and accurate global development data available, and includes national, regional and global estimates.",
"link": "https://databank.worldbank.org",
"region": "GLOBAL",
"tags": "economics"
},
{
"title": "TI Defence",
"social": ["https://twitter.com/TI_Defence"],
"description": "Transparency International Defence & Security works towards a world where governments, the armed forces, and arms transfers are transparent, accountable, and free from corruption.",
"link": "https://ti-defence.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "COW",
"social": ["https://twitter.com/correlatesofwar"],
"description": "Correlates Of War (COW) seeks to facilitate the collection, dissemination, and use of accurate and reliable quantitative data in international relations.",
"link": "https://correlatesofwar.org",
"region": "GLOBAL",
"tags": "geopolitics,terrorism"
},
{
"title": "VX Underground",
"social": ["https://twitter.com/vxunderground", "https://t.me/+njfLzUrqos01ZWNh"],
"description": "The largest collection of malware source code, samples, and papers on the internet.",
"link": "https://www.vx-underground.org",
"region": "GLOBAL",
"tags": "malware,exploit,vulnerability"
},
{
"title": "Maldatabase",
"social": ["https://twitter.com/maldatabase"],
"description": "Maldatabase is designed to help malware data science and threat intelligence feeds.",
"link": "https://maldatabase.com",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "FraudGuard",
"social": ["https://twitter.com/fraudguard_io", "https://www.linkedin.com/company/fraudguard"],
"description": "FraudGuard is a service designed to provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic. Utilizing just a few simple API endpoints we make integration as simple as possible and return data such as: Risk Level, Threat Type, Geo Location, etc.",
"link": "https://fraudguard.io",
"region": "GLOBAL",
"tags": "malware,network,web"
},
{
"title": "Dataplane",
"social": ["https://twitter.com/Dataplaneorg"],
"description": "Internet engineers, analysts, incident responders, and supporting organizations must be aware of trends, anomalies, threats, and misconfigurations that originate from within and outside their networks. Dataplane.org is a provider of data (signals), analysis, and statistics that increases the awareness which leads to a more robust and secure Internet.",
"link": "https://dataplane.org",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Cyware Feeds",
"social": ["https://twitter.com/cywareco", "https://www.facebook.com/Cywareco", "https://www.linkedin.com/company/cyware", "https://www.youtube.com/channel/UCBPcVKjzXijVkBWwV3wNjag"],
"description": "Free Cyware Threat Intelligence Feeds",
"link": "https://cyware.com/community/ctix-feeds",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "MalwareTech",
"social": ["https://twitter.com/MalwareTechBlog", "https://facebook.com/MalwareTech", "https://instagram.com/malwaretech", "https://www.linkedin.com/in/MalwareTech"],
"description": "Cyber Security, Tech, Analysis.",
"link": "https://malwaretech.com",
"region": "GLOBAL",
"tags": "individual,malware,exploit,vulnerability"
},
{
"title": "OpenPhish",
"description": "OpenPhish provides actionable intelligence data on active phishing threats.",
"link": "https://openphish.com",
"region": "GLOBAL",
"tags": "phishing"
},
{
"title": "ThreatFeeds",
"social": ["https://twitter.com/threatfeeds_io"],
"description": "Free and open-source threat intelligence feeds.",
"link": "https://threatfeeds.io",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "HoneyDB",
"social": ["https://twitter.com/HoneyPyLog"],
"description": "HoneyDB provides real time data of honeypot activity. This data comes from honeypot sensors deployed globally on the Internet.",
"link": "https://honeydb.io",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "AntiScan",
"description": "Scan your file online with multiple different antiviruses without distributing the results of your scan.",
"link": "https://antiscan.me",
"region": "GLOBAL",
"tags": "malware"
},
{
"title": "Phishing Initiative",
"description": "Phishing Initiative ables any Internet user to help fight against phishing attacks.",