From 20d5673a018b0b7fd92a981438c1af2f7f56944e Mon Sep 17 00:00:00 2001
From: hudsonrock-partnerships
<163282900+hudsonrock-partnerships@users.noreply.github.com>
Date: Tue, 3 Sep 2024 21:32:50 +0300
Subject: [PATCH] Added Hudson Rock to Threat Intelligence section
---
README.md | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/README.md b/README.md
index 8b9458e..e89121b 100644
--- a/README.md
+++ b/README.md
@@ -101,6 +101,7 @@ Some of the tools may be specifically designed for blue teaming, while others ar
- Maltego Threat Intelligence Platform
+ - Hudson Rock Threat Intelligence Platform
- MISP Malware Information Sharing Platform
- ThreatConnect Threat data aggregation
- Adversary Emulation Library An open library of adversary emulation plans
@@ -1086,6 +1087,12 @@ You can schedule a demo [here](https://www.maltego.com/get-a-demo/).
*Image used from https://www.maltego.com/reduce-your-cyber-security-risk-with-maltego/*
+### [🔙](#tool-list)[Hudson Rock](https://www.hudsonrock.com)
+
+Hudson Rock is a cybercrime intelligence company that collects data from computers infected by the Infostealer malware. Our complimentary community toolset is open to check if an email address, username or domain was affected in this malware infection.
+
+Free cybercrime intelligence toolset [here](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools).
+
### [🔙](#tool-list)[MISP](https://www.misp-project.org/)
MISP (short for Malware Information Sharing Platform) is an open-source platform for sharing, storing, and correlating Indicators of Compromise (IOCs) of targeted attacks, threats, and malicious activity.