Threat Intelligence Platform

Real-time aggregation of global cybersecurity threats from 7 open-source intelligence feeds. CISA KEV, NVD CVEs, Threatview, SANS ISC, and more — all in one dashboard.

START FREE TRIAL LOGIN
7
Intel Feeds
6H
Refresh Cycle
90D
Data Retention
24/7
Automated Pipeline

◈ CAPABILITIES

🔴

7 THREAT FEEDS

Aggregates data from CISA KEV, Threatview Hashes, SANS ISC, Blocklist.de, Tor Exit Nodes, PhishTank, and NVD.

REAL-TIME UPDATES

Automated data pipeline refreshes every 6 hours via GitHub Actions. Pro and Enterprise plans get even faster updates with priority processing.

🔍

ADVANCED SEARCH

Search across CVE IDs, IP addresses, domains, hashes, and more. Filter by severity, category, and time frame with debounced, instant results.

📊

EXPORT & INTEGRATE

Export threat data as JSON or CSV for integration with your SIEM, SOAR, or custom security workflows. Enterprise plans include full REST API access.

🛡️

DEDUPLICATION

Intelligent cross-source deduplication ensures clean, actionable data without duplicates or noise. 90-day retention window keeps data relevant.

🔑

TOKEN-BASED ACCESS

Secure, organization-level access with unique tokens. SHA-256 hashed credentials, brute-force protection, and 24-hour session expiry.

◈ HOW IT WORKS

01

REQUEST ACCESS

Sign up with your organization details. Choose Trial (free), Pro, or Enterprise plan.

02

RECEIVE TOKEN

Our team reviews your request and sends you a unique access token within 24 hours.

03

ACCESS DASHBOARD

Log in with your token to view real-time threats, search, filter, and export intelligence data.

04

INTEGRATE & ACT

Export CSV/JSON or use the Enterprise API to feed threat data directly into your SOC workflows.

◈ INTELLIGENCE FEEDS

🔴
CISA KEV
Known Exploited Vulnerabilities
📚
NVD
National Vulnerability Database
🦠
Threatview Hashes
Malware Hashes
🎯
SANS ISC
Attacking IPs
🎣
PhishTank
Phishing URLs
🧱
Blocklist.de
Botnets & Abuse IPs
🧅
Tor Exit Nodes
Anonymity Networks

◈ PLANS

TRIAL

FREE / 14 days
    • • CISA KEV (Known Exploited Vulnerabilities)
    • • Threatview Hashes
    • • SANS ISC
    • • Blocklist.de
    • • Tor Exit Nodes
    • • PhishTank
    • • NVD CVE Feed
  • Daily Data Refresh
  • 1 User
  • CSV/JSON Export
  • API Access
START TRIAL

ENTERPRISE

$99 / month
  • All 7 Threat Sources
  • 1-Hour Data Refresh
  • Unlimited Users
  • CSV/JSON Export
  • REST API Access
CONTACT US

◈ SECURITY & TRUST

🔐 ENCRYPTED CREDENTIALS

Master passwords and backup codes are hashed with SHA-256 before storage. Plaintext credentials are never persisted. All authentication flows use cryptographically secure token generation.

🛡️ XSS & INJECTION DEFENSE

Content Security Policy (CSP) headers on every page. All dynamic content sanitized through DOM APIs. Zero innerHTML with user-controlled data. Input validation via whitelists and regex.

⏱️ BRUTE-FORCE PROTECTION

Admin login locks after 5 failed attempts with exponential backoff (30s, 60s, 120s...). Backup code validation uses the same protection. Sessions auto-expire after 24 hours.

🔒 FIRESTORE SECURITY RULES

Database access is locked down with strict Firestore security rules. Public users can only read tokens (for login) and submit signup requests — nothing else.

📡 NO TRACKING

OIXLY does not use cookies, analytics trackers, or third-party advertising. Browser localStorage is used solely for 24-hour session management. No personal data is transmitted.

🌐 STATIC DEPLOYMENT

Hosted on GitHub Pages — no server to compromise. Authentication handled by Firebase with client-side token validation. The attack surface is minimal by design.

◈ FOUNDER

Gaurav Kailas Deore

Gaurav Kailas Deore

Founder & Application Security Engineer

Cybersecurity professional specializing in application security, vulnerability assessment, and threat intelligence. Experienced in protecting enterprise-scale applications, with active participation in global bug bounty programs and responsible disclosure. Holds a Master of Computer Applications degree.

Through OIXLY, he aims to build accessible and actionable threat intelligence solutions that help organizations and researchers stay ahead of evolving cyber threats.

◈ FREQUENTLY ASKED QUESTIONS

What is OIXLY?

OIXLY is a threat intelligence aggregation platform that collects, normalizes, and deduplicates data from 7 trusted, open-source cybersecurity feeds (CISA KEV, NVD, Threatview, SANS ISC, PhishTank, Blocklist.de, Tor Exit Nodes) into a single searchable dashboard.

How do I get access?

Click "Get Started" to submit an access request. Our team reviews requests and sends you a unique access token within 24 hours. You can start with a free 14-day trial.

Is the data real-time?

Data is refreshed automatically every 6 hours via our GitHub Actions pipeline. Enterprise plans can receive updates as frequently as every hour. All data is sourced directly from official feeds without modification.

Can I integrate OIXLY with my SIEM or SOAR?

Yes. Pro plans include CSV and JSON export. Enterprise plans include a full REST API with filtering, pagination, and rate limiting — perfect for feeding data into Splunk, QRadar, or custom SOAR playbooks.

How is my data secured?

Credentials are SHA-256 hashed, sessions auto-expire in 24 hours, and all pages enforce Content Security Policy headers. The platform is statically hosted on GitHub Pages with Firebase for authentication — no server to compromise.

Does OIXLY collect personal data?

No. OIXLY does not use cookies, analytics, or third-party trackers. Browser localStorage is used only for session management and is cleared automatically after 24 hours.

Can I cancel at any time?

Yes. There are no long-term contracts. Contact us to cancel your plan at any time, and your token will be gracefully deactivated.

LEGAL NOTICE

Disclaimer: The information provided on this website is published strictly for cybersecurity research, educational, and defensive security purposes. All data is aggregated from publicly available threat intelligence feeds.

No Warranty: All information is provided on an "as is" basis without warranties of any kind, express or implied. Users are responsible for independently validating information before acting on it.

Responsible Use: Information from this platform must not be used for unlawful activities, unauthorized access, or malicious purposes. Users agree to comply with all applicable laws.

Limitation of Liability: The operators of OIXLY shall not be liable for any damages arising from use or misuse of information published on this platform.

Intellectual Property: OIXLY is a trademark of OIXLY Security. All content, design, and code are the intellectual property of OIXLY Security unless otherwise noted.

PRIVACY POLICY

Data Collection: OIXLY does not collect any personal user data beyond what is submitted in the signup request form (organization name, business email, and selected plan). This data is stored in Firebase Firestore and used solely for access provisioning.

Cookies & Tracking: OIXLY does not use cookies, analytics services, or third-party advertising. The platform uses browser localStorage solely for session management, which auto-expires after 24 hours.

Third-Party Services: OIXLY uses Firebase (Google) for authentication and database services. Firebase is subject to Google's privacy policy. No personal data is shared with any other third party.

Data Retention: Threat intelligence data is retained for 90 days. User account data is retained for the duration of the subscription. Data is deleted upon request.

Contact: For privacy-related inquiries, contact oixly.intel@gmail.com.