Includes live cyber threat maps and cyber security sites.
Over 10,000 entries in the list of asns with malicious content.
BGP Stream is a free resource for receiving alerts about hijacks, leaks, and outages in the Border Gateway Protocol.
COVER YOUR TRACKS
Cover Your Tracks will analyse how well your browser and add-ons protect you against online tracking techniques.
Scan Google Chrome add-on’s to check the source code for permissions.
There are around 200 operations in CyberChef allowing you to carry out simple and complex tasks easily.
CYBER CRIME IP FEEDS
This site analyses all available security IP Feeds, mainly related to on-line attacks, on-line service abuse, malwares, botnets, command and control servers and other cybercrime activities.
Cyber Essentials is an UK Government backed scheme to help organisations against a whole range of the most common cyber attacks.
CYBER THREAT INTELLIGENCE
“Cyber threat intelligence made easy.”
CYBER THREAT REAL-TIME MAP
Based on data from Kaspersky Lab.
Digital Forensics Incident Response Training.
DIGITAL ATTACK MAP
Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.
World map of encryption laws and policies.
Offensive Security’s Exploit Database Archive.
Searchable database of counterfeit-related websites.
FIRE-EYE CYBER MAP
Live cyber threat map.
GreyNoise analyses Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.
Ethical hacking blog with practice tests and tips.
MALWARE SEARCH ENGINE
APT Groups, Operations and Malware Search Engine.
MALWARE AND SECURITY SCANNER
Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.
The official site for National Cyber Security Centre.
NCSC CONTACT VALIDATION FORM
Form that can be used when contacted by the NCSC to confirm that the person is authorised to contact you.
OFFENSIVE SECURITY BOOKMARKS
List of security websites by EK.
Pentest tips and tricks.
PEN TEST PARTNERS
News and resources.
Privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
SAFE BROWSING SITE STATUS
Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites. Every day, we discover thousands of new unsafe sites, many of which are legitimate websites that have been compromised. When we detect unsafe sites, we show warnings on Google Search and in web browsers. You can search to see whether a website is currently dangerous to visit.
SITE SAFETY CENTER
This free service has been made available so that you can check the safety of a particular URL that might seem suspicious. Trend Micro reserves the right to block automated programs from submitting large numbers of URLs for analysis.
The Spamhaus Project is an international nonprofit organization that tracks spam and related cyber threats such as phishing, malware and botnets, provides realtime actionable and highly accurate threat intelligence to the Internet’s major networks, corporations and security vendors, and works with law enforcement agencies to identify and pursue spam and malware sources worldwide.
The 10 most abused top level domains.
“Snusbase makes it easy to stay on top of the latest database breaches and makes sure you and your family stay safe online.”
Exploits and hackertool search engine.
Actionable Intelligence for Business and Government.
Live cyber attack threat map.
Urlscan.io is a service which analyses websites and the resources they request.
“VB is one of the world leaders in security software testing.”
Analyse suspicious files and URLs to detect types of malware, automatically share them with the security community.