Threat Catalogs
The Intrusion Vault catalogs are written to support condition- and outcome-based analysis, not narratives or tool-driven hype. Each catalog uses a consistent structure so teams can compare entries, support verification and validation, and keep defensive assumptions aligned with real intrusion activity. This is how Intrusion 8 helps keep the Defensible 10 Standards in check through a threat-informed counter perspective across the same ten domains.
THREAT ACTOR CATALOG
Defender focused threat actor intelligence, curated for clarity and use.
A curated catalog of documented adversary profiles used for instruction and defensive readiness. Each entry emphasizes motivations, behaviors, targeting patterns, and operational outcomes that defenders must anticipate.
-
Profile-driven entries with aliases and assessed intent
-
Behavior mapping for intrusion reasoning and defense planning
-
Designed for analysts, architects, and incident responders

THREAT VECTOR CATALOG
Map exposure conditions to impact paths, so defenses can be prioritized.
A structured view of compromise pathways that connect exposure conditions to impact paths. Built to help teams identify where intrusions succeed, then prioritize architecture and control improvements.
-
Entry surface, exposure condition, and impact path structure
-
Works as a bridge between Red Team insight and Blue Team design
-
Useful for tabletop exercises and capability assessments

THREAT TOOLS CATALOG
Tools observed in real intrusions, documented for defensive readiness.
A reference catalog that documents tools seen in real intrusions and how they support adversary operations. Focused on awareness and detection planning, not procedural instruction.
-
Tool purpose and operational function alignment
-
Detection and monitoring considerations for defenders
-
Supports threat-informed validation and training scenarios


