104 integrations
NIST National Vulnerability Database — CVE data, CVSS scores, affected products
Vulnerability IntelligenceExploit Prediction Scoring System — probability of exploitation in the wild
Vulnerability Intelligence
Known Exploited Vulnerabilities catalog — actively exploited CVEs
Vulnerability IntelligenceCommon Weakness Enumeration — software weakness classification
Vulnerability IntelligenceOpen Source Vulnerabilities — multi-ecosystem vulnerability database
Vulnerability IntelligenceGitHub Security Advisories — reviewed vulnerability database
Vulnerability IntelligenceCloud-specific vulnerabilities — AWS, Azure, GCP security issues
Vulnerability IntelligenceAdversarial tactics, techniques, and common knowledge framework
Threat IntelligenceCommon Attack Pattern Enumeration and Classification
Threat IntelligenceMITRE D3FEND — defensive cybersecurity techniques knowledge graph
Threat IntelligenceMalicious URL database — phishing, malware distribution, and C2 URLs
IOC & MalwareIOC sharing platform — IPs, domains, URLs linked to malware campaigns
IOC & MalwareOpen Threat Exchange — crowd-sourced threat intelligence and IOCs
IOC & MalwareIP abuse reporting and blacklist — crowdsourced reputation for malicious IPs
IOC & MalwareMalware sample repository — hashes, file types, and threat intelligence
IOC & MalwareBotnet C2 SSL certificate blacklist from abuse.ch
IOC & MalwareBotnet C2 IP blocklist tracking Feodo, Emotet, and TrickBot
IOC & MalwareCommunity-verified phishing URL database
IOC & MalwareReal-time phishing intelligence and URL feed
IOC & MalwareIP and domain reputation — spam, malware, and botnet blocklists
IOC & Malware
Computer Incident Response Center Luxembourg — CVE and vulnerability data
IOC & MalwareThreat intelligence and IOC feeds for IP, URL, and hash indicators
IOC & MalwareSANS Internet Storm Center — attack trend data and IP reputation
IOC & MalwareActively exploited CVE tracking — real-world exploitation evidence
IOC & MalwareMicrosoft Security Response Center — Patch Tuesday advisories
Vendor AdvisoriesCisco security advisories — network infrastructure vulnerabilities
Vendor AdvisoriesPAN-OS security advisories — firewall and SASE vulnerabilities
Vendor AdvisoriesRed Hat CVE database — RHSA/RHBA advisories for enterprise Linux
Vendor AdvisoriesDebian Security Tracker — DSA advisories for all packages
Vendor AdvisoriesUbuntu Security Notices — CVE coverage for Ubuntu packages
Vendor AdvisoriesAlpine SecDB — security database for Alpine packages
Vendor AdvisoriesFortiGuard security advisories — firewall and SD-WAN vulnerabilities
Vendor AdvisoriesAWS security bulletins and Amazon Linux package advisories
Vendor AdvisoriesRocky Linux security errata — community enterprise Linux advisories
Vendor AdvisoriesFrench national CERT advisories and security bulletins
Vendor AdvisoriesPublic exploits and PoCs archive — comprehensive exploit database
Exploit IntelligenceMetasploit modules — exploit framework with ready-to-use exploits
Exploit IntelligenceProjectDiscovery scanner templates for vulnerability detection
Exploit IntelligenceProof-of-concept exploits from GitHub repositories
Exploit IntelligenceProduct lifecycle tracking — EOL dates for 300+ software products
Asset IntelligenceCertificate Transparency log search — SSL/TLS certificate discovery
Asset IntelligenceShodan InternetDB — fast IP information and open port data
Asset IntelligenceInternet-wide scanning — open ports, banners, and exposed services
Asset IntelligenceInternet host and certificate scanning — attack surface visibility
Asset IntelligenceAmazon GuardDuty threat detection findings and anomalies
Cloud SecurityMicrosoft Azure Policy compliance findings and assessments
Cloud SecurityGoogle Cloud SCC findings, misconfigurations, and vulnerabilities
Cloud SecurityAWS/Azure/GCP security best practices and compliance checks
Cloud SecurityInfrastructure-as-code security scanning for Terraform, CloudFormation
Cloud SecurityNIST Cybersecurity Framework — risk management controls and categories
ComplianceCenter for Internet Security benchmarks for secure configuration
CompliancePayment Card Industry Data Security Standard requirements
ComplianceAICPA SOC 2 trust service criteria and controls
ComplianceHealth Insurance Portability and Accountability Act controls
ComplianceInformation security management system controls and clauses
ComplianceBreaking cybersecurity news, vulnerability disclosures, and threat analysis
News IntelligenceCybersecurity news on vulnerabilities, hacking, and data breaches
News IntelligenceIn-depth investigative cybersecurity reporting by Brian Krebs
News IntelligenceEnterprise cybersecurity analysis, news, and threat intelligence
News IntelligenceCybersecurity news, insights, and analysis for security professionals
News IntelligenceCybersecurity news by Recorded Future — APTs, ransomware, and policy
News Intelligence
CISA cybersecurity alerts, advisories, and ICS-CERT publications
News IntelligenceThreat intelligence and APT research from CrowdStrike Falcon team
News IntelligencePremier threat intelligence and incident response research by Google
News IntelligenceMalware campaigns, zero-day research, and threat intelligence
News IntelligencePalo Alto Networks threat research on APTs, malware, and campaigns
News IntelligenceDeep malware analysis, threat hunting, and endpoint security research
News IntelligenceTop-tier security commentary and cryptographic analysis by Bruce Schneier
News IntelligenceUK National Cyber Security Centre advisories and threat briefings
News IntelligenceQualys VM scan results, asset inventory, and policy compliance
Vulnerability ManagementTenable.io and Nessus scan findings and vulnerability data
Vulnerability ManagementRapid7 InsightVM vulnerability scan results and remediation data
Vulnerability ManagementOpen-source vulnerability scanner results and CVE mappings
Vulnerability ManagementVulnerability management and appsec orchestration platform findings
Vulnerability ManagementStatic analysis for security patterns across 30+ languages
SAST & Code SecurityGitHub CodeQL — semantic code analysis for security vulnerabilities
SAST & Code SecurityContinuous code quality and security analysis platform
SAST & Code SecurityEnterprise SAST, DAST, and SCA security testing platform
SAST & Code SecurityOpen source dependency vulnerabilities and license compliance
SCA & SBOMSBOM analysis and component vulnerability tracking
SCA & SBOM
Aqua Trivy — comprehensive vulnerability scanner for containers and IaC
SCA & SBOMMicrosoft Defender for Endpoint — alerts, incidents, and device inventory
EDR / XDRPalo Alto Cortex XDR — endpoint alerts and investigation data
EDR / XDROpen-source XDR and SIEM — security events and compliance
EDR / XDRContainer and Kubernetes security — image scanning and runtime protection
Container SecurityContainer runtime security, compliance, and forensics
Container SecurityOpen-source container registry with vulnerability scanning
Container SecurityInternet background noise intelligence — mass scanning and crawling activity
Attack SurfaceHistorical DNS, IP, and domain intelligence data
Attack SurfaceAgentless network discovery and asset inventory
Attack SurfaceAzure-native SIEM — security incidents and analytics rule alerts
SIEM & Observability
Splunk SIEM alerts, notable events, and risk-based alerting
SIEM & ObservabilityIBM QRadar SIEM offenses and correlated security events
SIEM & ObservabilityAzure AD / Entra identity protection risks and sign-in anomalies
Identity & AccessOkta identity security findings, policy violations, and user risks
Identity & AccessPrivileged access management — account anomalies and policy events
Identity & AccessHackerOne vulnerability reports and program disclosures
Bug BountyBugcrowd platform submissions and researcher findings
Bug BountyAtlassian Jira — vulnerability tickets, security issues, and sprint tracking
WorkflowServiceNow ITSM — security incidents, change requests, and CMDB
WorkflowLinear issues — engineering security tasks and vulnerability remediation
WorkflowCloudflare WAF events, bot management, and DDoS protection logs
Network SecuritySnort IDS/IPS — network intrusion detection rules and alerts
Network SecuritySuricata network threat detection engine rules and events
Network Security