Threat Catalogs
The Intrusion Vault catalogs are written to support condition- and outcome-based analysis, not narratives or tool-driven hype. Each catalog uses a consistent structure so teams can compare entries, support verification and validation, and keep defensive assumptions aligned with real intrusion activity. This is how Intrusion 8 helps keep the Defensible 10 Standards in check through a threat-informed counter perspective across the same ten domains.
THREAT ACTOR CATALOG
Defender focused threat actor intelligence, curated for clarity and use.
A curated catalog of documented adversary profiles used for instruction and defensive readiness. Each entry emphasizes motivations, behaviors, targeting patterns, and operational outcomes that defenders must anticipate.
-
Profile-driven entries with aliases and assessed intent
-
Behavior mapping for intrusion reasoning and defense planning
-
Designed for analysts, architects, and incident responders

THREAT VECTOR CATALOG
Map exposure conditions to impact paths, so defenses can be prioritized.
A structured view of compromise pathways that connect exposure conditions to impact paths. Built to help teams identify where intrusions succeed, then prioritize architecture and control improvements.
-
Entry surface, exposure condition, and impact path structure
-
Works as a bridge between Red Team insight and Blue Team design
-
Useful for tabletop exercises and capability assessments

THREAT TOOLS CATALOG
Tools observed in real intrusions, documented for defensive readiness.
A reference catalog that documents tools seen in real intrusions and how they support adversary operations. Focused on awareness and detection planning, not procedural instruction.
-
Tool purpose and operational function alignment
-
Detection and monitoring considerations for defenders
-
Supports threat-informed validation and training scenarios

Join the Intrusion 8 Red Team Intelligence community.
Defenders need responsible intelligence that reflects how intrusions succeed under real conditions. With ISAUnited membership, you can access the Intrusion Vault and also contribute to the catalogs and threat profiles through governed community input, strengthening your Red Team intelligence skills while helping validate defensible outcomes.

