1. Analyst Tools
1.1. Anomali
1.2. Cyware
1.3. Dispel.io
1.4. EclecticIQ
1.5. IBM i2 Analyst’s Notebook
1.6. Kaspersky
1.7. Paterva’s Maltego
1.8. Spiderfoot
1.9. SwordEye
1.10. ThreatConnect
1.11. ThreatQuotient
1.12. ThreatStop
2. Anti-Phishing/Spam
2.1. Area 1 Security
2.2. ChaosReigns
2.3. Cyren
2.4. DomainTools
2.5. Malwarebytes
2.5.1. hpHosts
2.5.1.1. https://hosts-file.net/
2.6. OpenPhish
2.7. PhishMe
2.8. PhishTank
2.9. RiskIQ
2.10. SegaSec
2.11. SentryBay
2.12. SpamRats
2.13. uceprotect.net
3. Brand Monitoring
3.1. ACID Technologies
3.2. Blueliv
3.3. BrandProtect
3.4. Digital Shadows
3.5. Recorded Future
3.6. Risk Based Security
3.7. RiskIQ
3.8. SpyCloud
4. Breached Credential Data
4.1. citadel.pw
4.2. haveibeenpwned.com
4.3. Kela Intelligence
4.4. Resecurity
4.5. Spycloud
5. Deep/Dark Web Monitoring
5.1. AlertLogic
5.2. AlienVault
5.3. CloudSek
5.4. Dark Shadows
5.5. DashLane
5.6. DigitalStakeout
5.7. Experian
5.8. Groupsense
5.9. Kela Intelligence
5.10. MarkMonitor
5.11. MassiveAlliance
5.12. Phishlabs
5.13. Recorded Future
5.14. Resecurity
5.15. Sovereign Intelligence
5.16. SpyCloud
5.17. Terbiumlabs
5.18. TruthFinder
5.19. WebHose.io
6. External Asset Discovery/Monitoring
6.1. Assetnote.io
6.2. CyberInt
6.3. Expanse
6.4. Kela Intelligence
6.5. Pwnieexpress
6.6. IBM (Formerly Randori)
6.7. ReSecurity
6.8. RiskIQ
6.9. Secapps
7. Feeds
7.1. Advertising Blocklists
7.1.1. Malwarebytes
7.1.1.1. hpHosts
7.1.1.1.1. https://hosts-file.net/
7.1.2. Systcl.org
7.2. Command and Control (C&C)
7.2.1. Cybercrime Tracker
7.2.2. LookingGlass
7.2.3. Proofpoint
7.2.4. ReSecurity
7.3. DNS DGA Feeds
7.3.1. Farsight Security
7.3.2. Bambenekconsulting
7.4. File Reputation
7.4.1. Findthatfile
7.4.2. Webroot
7.5. IP Reputation
7.5.1. ChaosReigns
7.5.2. Cyren
7.5.3. Kittenlasers
7.5.4. WebRoot Brightcloud
7.6. IP/Domain Block Lists
7.6.1. Abuse.ch
7.6.2. Asprox
7.6.3. Autoshun
7.6.4. Badips
7.6.5. Bambenek Consulting
7.6.5.1. http://osint.bambenekconsulting.com/feeds/dga-feed.txt
7.6.6. Binary Defense Systems
7.6.7. Blocklist.de
7.6.8. Carbonite
7.6.8.1. Acquired WebRoot
7.6.9. CI Army (CINS)
7.6.10. Cyren
7.6.11. FIREHOL
7.6.12. Greensnow
7.6.13. Malwarebytes
7.6.13.1. hpHosts
7.6.13.1.1. https://hosts-file.net/
7.6.14. Malwaredomains.com
7.6.15. MalwarePatrol
7.6.16. MVPSHosts
7.6.17. NoThink
7.6.18. ThreatCrowd
7.6.19. ThreatStop
7.7. Malicious URL
7.7.1. Cyren
7.7.2. Findthatfile
7.7.3. FIREHOL
7.7.4. Joxean
7.7.5. KnownSec
7.7.6. Malc0de.com
7.7.7. MalwareDomainlist.com
7.7.8. MalwarePatrol
7.7.9. StopBadware
7.7.10. VXVault
7.7.11. Webroot
7.8. Proxy Lists
7.8.1. FIREHOL
7.8.2. Proxylists.me
7.8.3. Spys.ru
7.9. Tor Exit Nodes
7.9.1. Dan.xxx
7.10. Zero-Day Feeds
7.10.1. ExodusIntel
7.10.2. Zerodium
7.11. Domain Categories
7.11.1. Zvelo
7.11.2. shallalist.de
7.11.3. Netstar, Inc
7.11.4. Unveiltech
7.11.5. Symantec
7.11.5.1. https://www.symantec.com/products/rulespace
7.11.6. Carbonite (Formerly Webroot)
7.11.6.1. BrightCloud
7.11.7. Kaspersky
7.11.7.1. https://www.kaspersky.com/web-filter
7.11.8. Blacklist UT1
7.11.8.1. http://dsi.ut-capitole.fr/blacklists/index_en.php
8. Fraud
8.1. Groupsense
8.2. Internet Fraud Alert
8.2.1. http://www.ifraudalert.org/default.aspx
8.3. Malwarebytes
8.3.1. hpHosts
8.3.1.1. https://hosts-file.net/
8.4. National Cyber-Forensics and Training Alliance
8.4.1. http://www.ncfta.net/Index.aspx
8.5. ReSecurity
8.6. ThreatMetrix
9. Indicators of Compromise
9.1. CIRCL
9.1.1. https://www.circl.lu/services/misp-malware-information-sharing-platform/
9.2. FIREHOL
9.3. FireEye
9.4. Nullsecure
9.5. Proofpoint
9.5.1. Emerging Threats
9.6. Wapack labs
9.6.1. https://cms.wapacklabs.com/
9.6.2. ThreatRecon
9.6.2.1. https://threatrecon.co/
9.7. Malware Samples & Hashes
9.7.1. Abuse.ch
9.7.2. Malc0de.com
9.7.3. MalwareConfig
9.7.4. OPSWAT
9.7.5. ThreatCrowd
9.7.6. VirusSign
9.7.7. Virustotal
9.7.8. VXVault
10. Intelligence Portals
10.1. AlienVault
10.2. AlienVault OTX
10.3. Censys.io
10.4. Cymon
10.5. IBM Xforce
10.6. Passivetotal
10.7. Pulsedive
10.8. ThreatCrowd
10.9. ThreatMiner
10.10. ThreatStop
10.11. Virustotal
10.12. ZoomEye.org
11. IPS Signatures/Rules
11.1. Proofpoint
11.2. Snort.org
12. Predictive Intelligence
12.1. Bfore.ai
12.2. Seclytics
12.3. Sovereign Intelligence
13. Security Technology Intelligence Enrichment
13.1. Anomali
13.2. EclecticIQ
13.3. Google (VirusTotal)
13.4. Outpost24
13.5. Proofpoint Emerging Threats Intelligence
13.6. ThreatBook
13.7. ThreatConnect
13.8. ThreatQuotient
14. Social/Web Media Monitoring
14.1. BrandProtect
14.2. ClearBit
14.2.1. https://clearbit.com/reveal
14.3. Digital Shadows
14.4. Recorded Future
14.5. ReSecurity
14.6. ZeroFOX
15. Threat Actor Intelligence
15.1. Blueliv
15.2. CrowdStrike
15.3. Cyware
15.4. Digital Shadows
15.5. FireEye
15.6. Flashpoint
15.7. Intel 471
15.8. Kaspersky
15.9. Kela Intelligence
15.10. Recorded Future
15.11. ReSecurity
15.12. Sovereign Intelligence
16. Threat Intelligence Analyst Outsourcing
16.1. Digital Shadows
16.2. Flashpoint
16.3. Intel 471
16.4. Kela Intelligence
17. Vulnerability Research
17.1. Telus Security Labs
17.1.1. http://telussecuritylabs.com/signatures/attack_detection
17.2. Vupen
17.2.1. http://www.vupen.com/english/services/tpp-index.php