Post

Essential Tools and Platforms for Cyber Threat Intelligence

Essential Tools and Platforms for Cyber Threat Intelligence

Introduction

A Cyber Threat Intelligence workflow depends on the ability to collect, enrich, validate, and contextualize heterogeneous evidence. No single platform is sufficient on its own: effective CTI usually combines breach intelligence, malware analysis, infrastructure monitoring, dark web visibility, and structured intelligence sharing.

This guide provides a curated overview of tools and platforms that can support analysts across tactical, operational, and strategic intelligence activities.


Breach and Credential Leak Intelligence

Have I Been Pwned

Have I Been Pwned helps verify whether email addresses or domains have appeared in known data breaches. It is particularly useful for awareness, exposure validation, and domain-level monitoring.

Hudson Rock – Cavalier

Cavalier focuses on infostealer-related exposure, helping organizations identify compromised devices, stolen credentials, and third-party risks associated with infected endpoints.

DeHashed

DeHashed provides breach data search capabilities across emails, usernames, IPs, hashes, domains, and other identifiers. It can support exposure analysis and incident investigation.

LeakPeek

LeakPeek provides visibility into infostealer logs, credentials, and leaked files. It can be useful for domain monitoring and enrichment of exposed identity artifacts.


Dark Web Monitoring and Marketplace Intelligence

DarkOwl Vision

DarkOwl Vision provides access to indexed dark web and darknet data, supporting threat hunting, brand monitoring, fraud investigation, and underground source analysis.

Rapid7 Threat Command

Formerly known as IntSights, Threat Command provides external threat intelligence, brand protection, dark web monitoring, and alerting capabilities integrated into enterprise workflows.

CyberSixgill

CyberSixgill offers deep and dark web monitoring, threat actor profiling, CVE exploitation tracking, and contextual intelligence for security teams.


General CTI Platforms and Enrichment Services

MISP

MISP is an open-source threat intelligence sharing platform used to store, correlate, and exchange indicators, TTPs, campaigns, and structured intelligence objects.

AlienVault OTX

OTX is a community-driven threat intelligence platform that allows users to consume and share indicator collections, known as pulses.

VirusTotal

VirusTotal aggregates file, URL, domain, and IP reputation data. It is widely used for triage, enrichment, and malware investigation.

Recorded Future

Recorded Future provides commercial threat intelligence capabilities, including real-time alerting, risk scoring, graph analysis, and strategic reporting.

Shodan

Shodan indexes Internet-connected devices and services. It is useful for exposure assessment, infrastructure fingerprinting, and attack surface monitoring.


Malware, Infrastructure, and IOC Analysis

ANY.RUN

ANY.RUN is an interactive malware sandbox that supports dynamic analysis of files, scripts, documents, and network behavior.

MalwareBazaar

MalwareBazaar, maintained by abuse.ch, provides malware samples and related metadata useful for malware research and detection engineering.

ThreatFox

ThreatFox collects and shares indicators of compromise with a strong focus on timely, community-driven threat intelligence.


Threat Actor and Campaign Intelligence

MITRE ATT&CK

MITRE ATT&CK is a knowledge base of adversary tactics and techniques. It supports behavior-based analysis, detection engineering, and threat actor mapping.

Malpedia

Malpedia provides structured information on malware families and threat groups, helping analysts connect tools, campaigns, and actors.


Conclusion

These tools provide a strong foundation for building a CTI workflow. Their real value emerges when they are integrated into a repeatable process: collection, enrichment, validation, correlation, and reporting. Used correctly, they help transform isolated indicators into intelligence that can support detection, prioritization, and strategic decision-making.

This post is licensed under CC BY 4.0 by the author.