Security Operations Tools

Threat Intelligence Reference

Search threat intelligence concepts. Covers TI types, MITRE ATT&CK tactics and techniques, IOC types, TLP classification, and threat actor attribution.

No data is transmitted — everything runs locally

Threat Intelligence Reference

The Threat Intelligence Reference covers TI types, MITRE ATT&CK, IOC types, TLP protocol, Diamond Model, and threat actor attribution categories.

• Look up MITRE ATT&CK tactics before a threat model exercise

• Reference TLP classification before sharing threat intelligence externally

• Find threat actor attribution categories before a threat landscape presentation

• Look up IOC types and their shelf life before building a TI program

Attack Surface Calculator — Calculate external attack surface score from internet-facing services, open ports, and unprotected accounts.
Open Attack Surface Calculator →
What does this tool tell you?
The Threat Intelligence Reference covers TI types, MITRE ATT&CK, IOC types, TLP protocol, Diamond Model, and threat actor attribution categories.
What affects the result most?
Threat intelligence types: strategic (executive), tactical (TTPs), operational (current campaigns), technical (IOCs). MITRE ATT&CK: adversary tactics, techniques, and procedures framework — 14 tactics, 200+ techniques. IOC types: IP, domain, hash, URL, email — tactical, short shelf-life.
How should I use the result?
Use this tool to orient quickly to the concepts, field names, or values you are about to look up in a full specification or vendor documentation. It summarizes the common cases; the authoritative source remains whichever standard or vendor doc defines the values themselves.
Detection SLA risk visibility. Better Stack for SecOps teams monitoring SIEM alert volume, detection coverage, and remediation SLA compliance.
View SecOps alerting options →
External site · Independent provider · We may receive a commission · Not a recommendation