Know a real threat name not in the list? Submit it for exclusion.
Select type and flavour, then hit GENERATE
No names saved yet
Know a real threat name not in the list? Submit it for exclusion.
Select type and flavour, then hit GENERATE
No names saved yet
Cybersecurity marketer since 2013. Founder and manager of the Cyberpros community, a professional network for cybersecurity marketers established in 2018.
Built this tool to help fellow marketers name threat actors, campaigns, and malware for thought leadership content, demos, training material, and research. Without accidentally stepping on real-world names.
A threat name generator creates original, plausible names for cybersecurity threat actors, APT groups, malware families, and attack campaigns. This tool generates names in the style used by major threat intelligence vendors while automatically excluding 700+ real-world known threat names to avoid conflicts.
The database covers 700+ publicly documented threat actor names sourced from MITRE ATT&CK, Malpedia, and other threat intelligence feeds. With Strict Exclusion enabled, any generated name that matches a known threat entity is discarded and regenerated automatically.
Five flavours: Natural (elements, weather, geology, organisms), Mythological (gods, creatures, ancient concepts), Technical (protocols, exploit terms, security concepts), Literature (gothic and dystopian references), and Mesh-up (hybrid of two flavours). Random selects one automatically.
Yes. Enter any word in the Anchor Word field and the generator builds a name around it, pairing it with a word from the selected flavour's word bank. For example, "Raven" with Technical flavour might produce "Raven Stack" or "Operation RavenKernel".
Cybersecurity marketers, researchers, threat intelligence analysts, and CTF organizers who need plausible threat actor names for thought leadership content, demos, training scenarios, tabletop exercises, and red team engagements — without reusing a real-world threat group name.
Generated names are not legally cleared. The exclusion list covers documented threat actors but is not exhaustive. Before any commercial, public, or operational use, conduct your own trademark and IP clearance checks. This tool does not provide legal advice.