63 live · 41 coming soon

INTEGRATIONS

Puffin AI aggregates security intelligence from 104+ sources — vulnerability databases, threat feeds, vendor advisories, exploit repositories, and news — into a single graph-enriched knowledge layer.

104 integrations

NVD
NVDLive

NIST National Vulnerability Database — CVE data, CVSS scores, affected products

Vulnerability Intelligence
EPSS
EPSSLive

Exploit Prediction Scoring System — probability of exploitation in the wild

Vulnerability Intelligence
CISA KEV
CISA KEVLive

Known Exploited Vulnerabilities catalog — actively exploited CVEs

Vulnerability Intelligence
CWE
CWELive

Common Weakness Enumeration — software weakness classification

Vulnerability Intelligence
OSV
OSVLive

Open Source Vulnerabilities — multi-ecosystem vulnerability database

Vulnerability Intelligence
GitHub Advisories
GitHub AdvisoriesLive

GitHub Security Advisories — reviewed vulnerability database

Vulnerability Intelligence
CloudVulnDB
CloudVulnDBLive

Cloud-specific vulnerabilities — AWS, Azure, GCP security issues

Vulnerability Intelligence
MITRE ATT&CK
MITRE ATT&CKLive

Adversarial tactics, techniques, and common knowledge framework

Threat Intelligence
CAPEC
CAPECLive

Common Attack Pattern Enumeration and Classification

Threat Intelligence
D3FEND
D3FENDLive

MITRE D3FEND — defensive cybersecurity techniques knowledge graph

Threat Intelligence
URLhaus
URLhausLive

Malicious URL database — phishing, malware distribution, and C2 URLs

IOC & Malware
ThreatFox
ThreatFoxLive

IOC sharing platform — IPs, domains, URLs linked to malware campaigns

IOC & Malware
AlienVault OTX
AlienVault OTXLive

Open Threat Exchange — crowd-sourced threat intelligence and IOCs

IOC & Malware
AbuseIPDB
AbuseIPDBLive

IP abuse reporting and blacklist — crowdsourced reputation for malicious IPs

IOC & Malware
MalwareBazaar
MalwareBazaarLive

Malware sample repository — hashes, file types, and threat intelligence

IOC & Malware
SSL Blacklist
SSL BlacklistLive

Botnet C2 SSL certificate blacklist from abuse.ch

IOC & Malware
Feodo Tracker
Feodo TrackerLive

Botnet C2 IP blocklist tracking Feodo, Emotet, and TrickBot

IOC & Malware
PhishTank
PhishTankLive

Community-verified phishing URL database

IOC & Malware
OpenPhish
OpenPhishLive

Real-time phishing intelligence and URL feed

IOC & Malware
Spamhaus
SpamhausLive

IP and domain reputation — spam, malware, and botnet blocklists

IOC & Malware
CIRCL
CIRCLLive

Computer Incident Response Center Luxembourg — CVE and vulnerability data

IOC & Malware
CyberCure
CyberCureLive

Threat intelligence and IOC feeds for IP, URL, and hash indicators

IOC & Malware
DShield
DShieldLive

SANS Internet Storm Center — attack trend data and IP reputation

IOC & Malware
InTheWild
InTheWildLive

Actively exploited CVE tracking — real-world exploitation evidence

IOC & Malware
Microsoft MSRC
Microsoft MSRCLive

Microsoft Security Response Center — Patch Tuesday advisories

Vendor Advisories
Cisco PSIRT
Cisco PSIRTLive

Cisco security advisories — network infrastructure vulnerabilities

Vendor Advisories
Palo Alto Networks
Palo Alto NetworksLive

PAN-OS security advisories — firewall and SASE vulnerabilities

Vendor Advisories
Red Hat
Red HatLive

Red Hat CVE database — RHSA/RHBA advisories for enterprise Linux

Vendor Advisories
Debian
DebianLive

Debian Security Tracker — DSA advisories for all packages

Vendor Advisories
Ubuntu
UbuntuLive

Ubuntu Security Notices — CVE coverage for Ubuntu packages

Vendor Advisories
Alpine Linux
Alpine LinuxLive

Alpine SecDB — security database for Alpine packages

Vendor Advisories
Fortinet
FortinetLive

FortiGuard security advisories — firewall and SD-WAN vulnerabilities

Vendor Advisories
Amazon Linux
Amazon LinuxLive

AWS security bulletins and Amazon Linux package advisories

Vendor Advisories
Rocky Linux
Rocky LinuxLive

Rocky Linux security errata — community enterprise Linux advisories

Vendor Advisories
CERT-FR
CERT-FRLive

French national CERT advisories and security bulletins

Vendor Advisories
Exploit-DB
Exploit-DBLive

Public exploits and PoCs archive — comprehensive exploit database

Exploit Intelligence
Metasploit
MetasploitLive

Metasploit modules — exploit framework with ready-to-use exploits

Exploit Intelligence
Nuclei Templates
Nuclei TemplatesLive

ProjectDiscovery scanner templates for vulnerability detection

Exploit Intelligence
GitHub PoCs
GitHub PoCsLive

Proof-of-concept exploits from GitHub repositories

Exploit Intelligence
End-of-Life
End-of-LifeLive

Product lifecycle tracking — EOL dates for 300+ software products

Asset Intelligence
crt.sh
crt.shLive

Certificate Transparency log search — SSL/TLS certificate discovery

Asset Intelligence
InternetDB
InternetDBLive

Shodan InternetDB — fast IP information and open port data

Asset Intelligence
Shodan
ShodanSoon

Internet-wide scanning — open ports, banners, and exposed services

Asset Intelligence
Censys
CensysSoon

Internet host and certificate scanning — attack surface visibility

Asset Intelligence
AWS GuardDuty
AWS GuardDutySoon

Amazon GuardDuty threat detection findings and anomalies

Cloud Security
Azure Policy
Azure PolicySoon

Microsoft Azure Policy compliance findings and assessments

Cloud Security
GCP Security Command Center
GCP Security Command CenterSoon

Google Cloud SCC findings, misconfigurations, and vulnerabilities

Cloud Security
Prowler
ProwlerSoon

AWS/Azure/GCP security best practices and compliance checks

Cloud Security
Checkov
CheckovSoon

Infrastructure-as-code security scanning for Terraform, CloudFormation

Cloud Security
NIST CSF
NIST CSFLive

NIST Cybersecurity Framework — risk management controls and categories

Compliance
CIS Benchmarks
CIS BenchmarksLive

Center for Internet Security benchmarks for secure configuration

Compliance
PCI DSS
PCI DSSLive

Payment Card Industry Data Security Standard requirements

Compliance
SOC 2
SOC 2Live

AICPA SOC 2 trust service criteria and controls

Compliance
HIPAA
HIPAALive

Health Insurance Portability and Accountability Act controls

Compliance
ISO 27001
ISO 27001Live

Information security management system controls and clauses

Compliance
BleepingComputer
BleepingComputerLive

Breaking cybersecurity news, vulnerability disclosures, and threat analysis

News Intelligence
The Hacker News
The Hacker NewsLive

Cybersecurity news on vulnerabilities, hacking, and data breaches

News Intelligence
KrebsOnSecurity
KrebsOnSecurityLive

In-depth investigative cybersecurity reporting by Brian Krebs

News Intelligence
Dark Reading
Dark ReadingLive

Enterprise cybersecurity analysis, news, and threat intelligence

News Intelligence
SecurityWeek
SecurityWeekLive

Cybersecurity news, insights, and analysis for security professionals

News Intelligence
The Record
The RecordLive

Cybersecurity news by Recorded Future — APTs, ransomware, and policy

News Intelligence
CISA Alerts
CISA AlertsLive

CISA cybersecurity alerts, advisories, and ICS-CERT publications

News Intelligence
CrowdStrike Blog
CrowdStrike BlogLive

Threat intelligence and APT research from CrowdStrike Falcon team

News Intelligence
Mandiant
MandiantLive

Premier threat intelligence and incident response research by Google

News Intelligence
Cisco Talos
Cisco TalosLive

Malware campaigns, zero-day research, and threat intelligence

News Intelligence
Unit 42
Unit 42Live

Palo Alto Networks threat research on APTs, malware, and campaigns

News Intelligence
SentinelOne Labs
SentinelOne LabsLive

Deep malware analysis, threat hunting, and endpoint security research

News Intelligence
Schneier on Security
Schneier on SecurityLive

Top-tier security commentary and cryptographic analysis by Bruce Schneier

News Intelligence
NCSC
NCSCLive

UK National Cyber Security Centre advisories and threat briefings

News Intelligence
Qualys
QualysSoon

Qualys VM scan results, asset inventory, and policy compliance

Vulnerability Management
Tenable
TenableSoon

Tenable.io and Nessus scan findings and vulnerability data

Vulnerability Management
Rapid7 InsightVM
Rapid7 InsightVMSoon

Rapid7 InsightVM vulnerability scan results and remediation data

Vulnerability Management
OpenVAS
OpenVASSoon

Open-source vulnerability scanner results and CVE mappings

Vulnerability Management
DefectDojo
DefectDojoSoon

Vulnerability management and appsec orchestration platform findings

Vulnerability Management
Semgrep
SemgrepSoon

Static analysis for security patterns across 30+ languages

SAST & Code Security
CodeQL
CodeQLSoon

GitHub CodeQL — semantic code analysis for security vulnerabilities

SAST & Code Security
SonarQube
SonarQubeSoon

Continuous code quality and security analysis platform

SAST & Code Security
Checkmarx
CheckmarxSoon

Enterprise SAST, DAST, and SCA security testing platform

SAST & Code Security
Snyk
SnykSoon

Open source dependency vulnerabilities and license compliance

SCA & SBOM
Dependency-Track
Dependency-TrackSoon

SBOM analysis and component vulnerability tracking

SCA & SBOM
Trivy
TrivySoon

Aqua Trivy — comprehensive vulnerability scanner for containers and IaC

SCA & SBOM
Microsoft Defender
Microsoft DefenderSoon

Microsoft Defender for Endpoint — alerts, incidents, and device inventory

EDR / XDR
Cortex XDR
Cortex XDRSoon

Palo Alto Cortex XDR — endpoint alerts and investigation data

EDR / XDR
Wazuh
WazuhSoon

Open-source XDR and SIEM — security events and compliance

EDR / XDR
Aqua Security
Aqua SecuritySoon

Container and Kubernetes security — image scanning and runtime protection

Container Security
Sysdig
SysdigSoon

Container runtime security, compliance, and forensics

Container Security
Harbor
HarborSoon

Open-source container registry with vulnerability scanning

Container Security
GreyNoise
GreyNoiseSoon

Internet background noise intelligence — mass scanning and crawling activity

Attack Surface
SecurityTrails
SecurityTrailsSoon

Historical DNS, IP, and domain intelligence data

Attack Surface
runZero
runZeroSoon

Agentless network discovery and asset inventory

Attack Surface
Microsoft Sentinel
Microsoft SentinelSoon

Azure-native SIEM — security incidents and analytics rule alerts

SIEM & Observability
Splunk
SplunkSoon

Splunk SIEM alerts, notable events, and risk-based alerting

SIEM & Observability
IBM QRadar
IBM QRadarSoon

IBM QRadar SIEM offenses and correlated security events

SIEM & Observability
Microsoft Entra ID
Microsoft Entra IDSoon

Azure AD / Entra identity protection risks and sign-in anomalies

Identity & Access
Okta
OktaSoon

Okta identity security findings, policy violations, and user risks

Identity & Access
CyberArk
CyberArkSoon

Privileged access management — account anomalies and policy events

Identity & Access
HackerOne
HackerOneSoon

HackerOne vulnerability reports and program disclosures

Bug Bounty
Bugcrowd
BugcrowdSoon

Bugcrowd platform submissions and researcher findings

Bug Bounty
Jira
JiraSoon

Atlassian Jira — vulnerability tickets, security issues, and sprint tracking

Workflow
ServiceNow
ServiceNowSoon

ServiceNow ITSM — security incidents, change requests, and CMDB

Workflow
Linear
LinearSoon

Linear issues — engineering security tasks and vulnerability remediation

Workflow
Cloudflare
CloudflareLive

Cloudflare WAF events, bot management, and DDoS protection logs

Network Security
Snort
SnortSoon

Snort IDS/IPS — network intrusion detection rules and alerts

Network Security
Suricata
SuricataSoon

Suricata network threat detection engine rules and events

Network Security