Skip to content
View KadeMorton's full-sized avatar

Organizations

@arachne-threat-intel

Block or report KadeMorton

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
KadeMorton/README.md

Kade Morton

Founder & CEO at Vrax (formerly Arachne Digital)

🛡️ Mission: Making Threat-Informed Defense Evidence-Based

I’m a former SOC analyst turned founder. I believe security teams are drowning in noise because threat intelligence is too hard to operationalize and too often based on vendor vibes rather than structured data.

I built Vrax to turn public threat reporting into a verified, actionable dataset that tells teams exactly what to prioritize and why.


🚀 What I'm Building

My work focuses on the intersection of CTI, Automation, and MITRE ATT&CK.

  • Vrax (Arachne Digital): Commercial Precision Feeds for evidence-based defense.
  • Thread: An open-source analyst tool for mapping OSINT to MITRE ATT&CK.
  • Tracery: A privacy-centric metasearch engine for threat collection.
  • Spindle: A tool for cyber threat actor tracking and alias deconfliction.

🧠 Operating Philosophy

  • Moneyball for Security: Security spending should be driven by real-world threat data, not hype. Get runs, not insubstantials!
  • Human-in-the-loop: AI helps us scale, but human verification is the Trust Layer that makes CTI actionable.
  • Open Foundations: I believe in building open-source tooling to support the security community while providing high-integrity data assets commercially.

📊 Tactical Focus

  • Threat-Informed Defense (TID)
  • CTI Operationalization & Tooling
  • Security Data Engineering
  • Strategic Defense Frameworks (MITRE ATT&CK, DISARM)

📬 Connect with Me

"Don't trust the marketing. Verify the evidence."

Pinned Loading

  1. arachne-threat-intel/thread arachne-threat-intel/thread Public

    Forked from mitre-attack/tram

    Thread is a tool for analysts to map finished reports and articles to MITRE ATT&CK®.

    Python 11 5

  2. arachne-threat-intel/tracery arachne-threat-intel/tracery Public

    Forked from searx/searx

    Privacy-respecting metasearch engine

    Python 5

  3. arachne-threat-intel/spindle arachne-threat-intel/spindle Public

    Tracking information about cyber threat actors

    Python 4

  4. arachne-threat-intel/community arachne-threat-intel/community Public

    A repository for community building

    2