dogesec Logo

we build software for cyber threat intelligence analysts

CTI Butler

The most important cyber threat intelligence knowledgebases.

Vulmatch

Know when software you use is being exploited.

Obstracts

Turn any blog into structured threat intelligence.

Stixify

Your automated threat intelligence analyst.

SIEM Rules

Your detection engineering AI assistant. Turn cyber threat intelligence research into highly-tuned detection rules.

SIEM Rules. Your detection engineering database.

Open-Source Projects

All dogesec commercial products are built in-part from code-bases we have made available under permissive licenses.

dogesec Github