Links
Strategic
Section titled “Strategic”Tactical and Operational
Section titled “Tactical and Operational”- https://cvefeed.io/
- https://oasis-open.github.io/cti-documentation/
- https://stack.watch/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/cyber-intelligence
- https://oasis-open.github.io/cti-documentation/
- https://www.misp-project.org/
- https://www.circl.lu/doc/misp/feed-osint/
- https://iplists.firehol.org/
- https://rules.emergingthreats.net/blockrules/compromised-ips.txt
- https://raw.githubusercontent.com/openphish/public_feed/refs/heads/main/feed.txt
- https://www.botvrij.eu/data/feed-osint/
- http://vxvault.net/URL_List.php
- https://www.spamhaus.org/drop/drop.txt
- https://sblam.com/blacklist.txt
- https://isc.sans.edu/feeds/block.txt
- https://dataplane.org/
- https://danger.rulez.sk/projects/bruteforceblocker/blist.php
- https://www.dshield.org/xml.html
- https://www.stopforumspam.com/
- https://www.abuseipdb.com/
- https://github.com/dpup/freemail
- https://github.com/tompec/disposable-email-domains/
- https://phishunt.io/
- https://otx.alienvault.com/
- https://levelblue.com/blogs/security-essentials/otx-is-now-a-free-stix-taxii-server
- https://www.anomali.com/blog/anomali-limo-service
- https://www.anomali.com/blog/open-source-threat-intelligence-feeds
- https://abuse.ch/
- https://threatfox.abuse.ch/
- https://www.anomali.com/products/threatstream
- https://www.criminalip.io/
- https://www.vulncheck.com/product/exploit-intelligence
- https://www.opencve.io/
- https://www.advisoryweek.com/
- https://alerts.vulmon.com/
- https://secalerts.co/
- https://www.cvedetails.com/
- https://www.cytidel.com/
- https://www.secalliance.com/managed-cti/vulnerability-intelligence
- https://seclists.org/fulldisclosure/
- https://threatconnect.com/
- https://www.recordedfuture.com/products/threat-intelligence
- https://www.crowdstrike.com/en-us/platform/threat-intelligence/
- https://www.mandiant.com/
- https://fireeye.market/
- https://www.infragardnational.org/
- https://openphish.com/index.html
- https://www.phishtank.com/
- https://www.fsisac.com/
- https://ripjar.com/third-party-risk-management/
- https://www.moodys.com/web/en/us/kyc/sectors/government.html?
- https://talosintelligence.com/
- https://flashpoint.io/
- https://isc.sans.edu/
- https://www.cisa.gov/
- https://vm.misp-project.org/latest/
- https://assets.recordedfuture.com/Reports/2025-State-of-Threat-Intelligence.pdf
- https://www.open-scap.org/
- https://blog.sucuri.net/#
- https://digital.nhs.uk/cyber-alerts
- https://vulners.com/
- https://cvedb.shodan.io/
- https://www.resecurity.com/fr/blog/article/f5-big-ip-source-code-leak-tied-to-state-linked-campaigns-using-brickstorm-backdoor
- https://unit42.paloaltonetworks.com/operation-rewrite-seo-poisoning-campaign/
- internet-albedo.net
- Documentation | CrowdSec
- https://www.cisecurity.org/cybersecurity-threats
- https://www.splunk.com/en_us/pdfs/gated/ebooks/top-50-cybersecurity-threats.pdf
- https://dehashed.com/