Click your stack. See only what matters.
v0.1 — building
Cyber intel for your stack.

25+ threat intelligence feeds. One-click vendor filtering. Hourly updates. No noise.

  $ threatfilter --stack palo-alto,cisco,fortinet --severity high+

  Fetching from 25 sources...

  [CRIT 9.8] CVE-2026-XXXXX · Palo Alto PAN-OS auth bypass
             Actively exploited in the wild · CISA KEV
             → advisory  → nvd  → details

  [HIGH 8.1] Cisco IOS XE privilege escalation
             PoC available · Cisco PSIRT
             → advisory  → cve  → details

  [HIGH 7.9] Fortinet FortiOS heap overflow
             Unproven exploitation · Fortinet PSIRT
             → advisory  → cve  → details

  Updated 4 minutes ago. 3 items match your stack.
        
[v]

One-click stack filter

Click vendor logos to filter. URL captures your selection for bookmarks and sharing.

[!]

Severity + exploitation status

CVSS scores, critical/high/medium labels, and active exploitation flags from CISA KEV.

[@]

Geo targeting

Filter by targeted regions: US, EU, UK, JP, TW, AU, and more.

[t]

Hourly updates

25+ sources ingested every hour. Stale indicator if any source goes quiet.

Get notified when it launches

Daily 07:00 digest of high-severity items for your stack. Free. No spam.