Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated ANY.RUN Threat Intelligence Alternatives

ANY.RUN Threat Intelligence Reviews & Product Details

ANY.RUN Threat Intelligence Overview

What is ANY.RUN Threat Intelligence?

ANY.RUN provides cybersecurity products to organizations and individual researchers that strengthen their ability to analyze, investigate, and understand emerging and evolving threats. The company has a suite of Threat Intelligence Feeds, Threat Intelligence Lookup, and YARA Search. Threat Intelligence Lookup is an online tool that lets users query IOCs against a large database. The software provides context and actionable insights on events, IP addresses, domains, file hashes, URLs, and more, allowing you to quickly evaluate the risk of IOCs during incident response or cyber threat hunting. A threat intelligence feed provides a near real-time stream of threat data from external sources. Organizations leverage these feeds to keep security defenses like SIEMs up-to-date against new attacks. Keep your solutions up-to-date with the latest malicious IPs, URLs, and domains, available in JSON and STIX.

ANY.RUN Threat Intelligence Details
Languages Supported
English
Show LessShow More
Product Description

ANY.RUN provides cybersecurity products to organizations and individual researchers that strengthen their ability to analyze, investigate, and understand emerging and evolving threats. The company has a suite of Threat Intelligence Feeds, Threat Intelligence Lookup, and YARA Search. Threat Intelligence Lookup is an online tool that lets users query IOCs against a large database. The software provides context and actionable insights on events, IP addresses, domains, file hashes, URLs, and more, allowing you to quickly evaluate the risk of IOCs during incident response or cyber threat hunting. A threat intelligence feed provides a near real-time stream of threat data from external sources. Organizations leverage these feeds to keep security defenses like SIEMs up-to-date against new attacks. Keep your solutions up-to-date with the latest malicious IPs, URLs, and domains, available in JSON and STIX.


Seller Details
Seller
ANY.RUN
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
27,431 Twitter followers
LinkedIn® Page
www.linkedin.com
198 employees on LinkedIn®
Description

ANY.RUN is an interactive online malware analysis service created for dynamic and static research of multiple types of cyber threats. One of the major competitive advantages of ANY.RUN is that the service is developed as an interactive analysis tool. The company aims to provide all the information by executing the task. ANY.RUN displays the creation of various processes in real time, allowing the researcher to see the whole picture during simulation. While automated analysis can be fooled by some of the modern malicious programs, ANY.RUN strives to provide a robust way of interactive testing with real-time access to the sandbox simulation.


VB
Overview Provided by:

Recent ANY.RUN Threat Intelligence Reviews

Siam A.
SA
Siam A.Small-Business (50 or fewer emp.)
5.0 out of 5
"A splendid tool for malware analysis"
ANY.RUN Threat Intelligence significantly reduces the workload for malware analysts. One of its standout features is the user interface, which prov...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ANY.RUN Threat Intelligence Media

ANY.RUN Threat Intelligence Demo - TI Dashboard
Identify threats with linked indicators
ANY.RUN Threat Intelligence Demo - TI LookUp
Perform detailed Threat Intelligence searches to add context to indicators and find linked threats.
ANY.RUN Threat Intelligence Demo - TI LookUp Overview
Use linked data from search results to understand how individual indicators or events tie to known threats.
Answer a few questions to help the ANY.RUN Threat Intelligence community
Have you used ANY.RUN Threat Intelligence before?
Yes

1 ANY.RUN Threat Intelligence Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 ANY.RUN Threat Intelligence Reviews
5.0 out of 5
1 ANY.RUN Threat Intelligence Reviews
5.0 out of 5
G2 reviews are authentic and verified.
Siam A.
SA
Content Creator
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about ANY.RUN Threat Intelligence?

ANY.RUN Threat Intelligence significantly reduces the workload for malware analysts. One of its standout features is the user interface, which provides a well structured presentation of data that clearly shows the behavior of malware samples. This organized approach enables researchers and analysts to identify the techniques and attack vectors used by malware more efficiently. It also provides a more intuitive experience compared to traditional analysis methods in your own isolated virtualized environment. Review collected by and hosted on G2.com.

What do you dislike about ANY.RUN Threat Intelligence?

It would be nice if the UI were more customizable, allowing users to resize different window or elements. Review collected by and hosted on G2.com.

What problems is ANY.RUN Threat Intelligence solving and how is that benefiting you?

ANY.RUN Threat Intelligence has been a great tool for aiding my research and saving a lot of time. Review collected by and hosted on G2.com.

There are not enough reviews of ANY.RUN Threat Intelligence for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Expedition Logo
Palo Alto Expedition
4.3
(21)
The open-source Expedition tool speeds your migration to next-generation firewall technologies and more efficient processes, enabling you to keep pace with emerging security threats and industry best practices.
2
Suhosin Logo
Suhosin
4.4
(17)
Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.
3
DeleteMe Logo
DeleteMe
4.2
(14)
DeleteMe helps businesses large and small Keep Employee Information Private
4
SecureBridge Logo
SecureBridge
4.9
(12)
SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
5
mSpy Logo
mSpy
3.8
(10)
mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.
6
Execweb Logo
Execweb
5.0
(6)
Execweb is a leading Cybersecurity Executive Network that connects vendors with CISOs/CIOs via 1:1 virtual meetings & roundtables
7
Outlook PST Recovery Logo
Outlook PST Recovery
4.7
(5)
Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.
8
SiteOwl Logo
SiteOwl
4.5
(4)
SiteOwl is the world’s first unified, digital platform for security integrators and system managers that provides an end-to-end solution to help users design, install, and manage their security systems. SiteOwl brings modern technology to the job site by equipping designers, field technicians, and integrator customers with a suite of mobile and cloud-based applications to efficiently manage security system design, installations, and service management. Positioned as a drag-and-drop solution for security teams, SiteOwl makes it easy to construct powerful security solutions on the fly while receiving real-time updates on customer approvals, installation progress, and more.
9
Message Classification Logo
Message Classification
4.5
(3)
Protect your organization's information assets by allowing users to classify and label all emails at the point of creation.
10
Siemens SiPass Integrated Logo
Siemens SiPass Integrated
5.0
(2)
Siemens SiPass Integrated is a powerful and extremely flexible access control system that provides a very high level of security without compromising convenience.
Show More