danielsmith-eu / awesome-intelligence

A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources

Home Page:https://in.scanfactory.io/intelligence.html

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ScanFactory

ScanFactory LinkedIn ScanFactory Twitter

Awesome Intelligence 🔗

Feel free to add your contributions to intel.json

Supported Tags
network, web, malware, vulnerability, exploit, code, image, geopolitics, crypto, breach, economics, social, stocks, tor, terrorism, phishing

TITLEDESCRIPTIONREGIONTAGS
CVEMON
CVE Exploits Search UtilityGLOBALexploit
Shodan
Search Engine that lets users search for various types of servers connected to the internet using a variety of filters.GLOBALweb,network,vulnerability,image
Censys Search
Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.GLOBALweb,network
NerdyData
Get a list of websites that use certain technologies, plus their company and spend data. Perfect for lead generation, market analysis, and competitive research.GLOBALweb
PublicWWW
Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.GLOBALweb,code
SearchCode
Search 75 billion lines of code from 40 million projectsGLOBALcode
SimilarSites
Easily Explore alternative websitesGLOBALweb,image
Netlas
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.GLOBALweb,network,vulnerability
CriminalIP
Search for information on anything connected to public internetGLOBALweb,network,vulnerability,image
Kaspersky OpenTIP
Kaspersky Threat Intelligence Portal allows you to scan files, domains, IP addresses, and URLs for threats, malware, viruses.GLOBALmalware
GreyNoise
GreyNoise captures data on IPs that scan the internet and saturate security tools with internet noise, so SOC teams can focus on threats that matter and ignore those that don't.GLOBALweb,malware,network
Intezer Analyze
Malware analysis platform quickly classifying malware and unknown files. Unlike Antivirus and EDRs which mostly produce generic results (think “Trojan.Generic”) and can only classify specific hashes, Intezer analyzes the code itself in order to categorize the threat and classify variants from the same malware family.GLOBALmalware
Chaos Dataset
This project is meant to enhance research and analyse changes around DNS for better insights.GLOBALnetwork
BBR Dataset
Recon data for public bug bounty programs.GLOBALnetwork,web
Arkham Intelligence
Powerful tools for linking cryptocurrency activity to real world individuals and institutions.GLOBALcrypto
AlienVault OTX
A Threat data platform that allows security researchers and threat data producers to share research and investigate new threats.GLOBALmalware,network,web
ExploitDB
An archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.GLOBALexploit,vulnerability
WhatsMyName
This tool allows you to enumerate usernames across many websites.GLOBALsocial
Dehashed
DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine to help secure accounts and provide insight on compromised assets.GLOBALbreach
ManyPasswords
Default passwords for IoT devices and for web applications (for ex. MySQL and PostgreSQL admin panels)GLOBALexploit
BrandDB
Perform a trademark search by text or image in brand data from multiple national and international sources, including trademarks, appellations of origin and official emblems.GLOBALcompany
DNS History
Domain Name System (DNS) Historical Record ArchiveGLOBALnetwork
The World Factbook
The World Factbook provides basic intelligence on the history, people, government, economy, energy, geography, environment, communications, transportation, military, terrorism, and transnational issues for 266 world entities.GLOBALgeopolitics,terrorism,economics
Global Terrorism Catalogue
Catalogue of Terrorist Incidents occurred globally since 1968.GLOBALterrorism
Ransom Wiki
Check if your company or partner appears in a claimed ransom attack breach.GLOBALbreach
Xlocate
The ultimate exploits/references finderGLOBALexploit
Public Intelligence
Public Intelligence is an international, collaborative research project aimed at aggregating the collective work of independent researchers around the globe who wish to defend the public's right to access information.GLOBALgeopolitics
Intelligence Briefs
Strategic Intelligence News publishes intelligence reports, geopolitics, military intelligence, and crime reports analysis.GLOBALgeopolitics,terrorism
RAND Corporation
The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest.GLOBALgeopolitics,terrorism
ProjectDiscovery
An open-source software company that builds tools to detect and remediate vulnerabilities from development to production.GLOBALnetwork,web,exploit,vulnerability
BeVigil
The internet's first and only security search engine for mobile apps.GLOBALnetwork,vulnerability
CINS Army List
CINS Army shares valuable threat intelligence harvested from their CINS system. The CINS Army list is a subset of the CINS Active Threat Intelligence ruleset, and consists of IP addresses having poor recent Rogue Packet score factor or have tripped a designated number of trusted alerts across a given number of their Sentinels deployed around the world.GLOBALmalware,network
Umbrella List
The popularity list contains most queried domains based on passive DNS usage across Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries.GLOBALnetwork
MalwareBazaar
MalwareBazaar is a project from abuse.ch with the goal of sharing malware samples with the infosec community, AV vendors and threat intelligence providers.GLOBALmalware
BD Banlist
Binary Defense Systems Artillery Threat Intelligence Feed and Banlist FeedGLOBALmalware
AbuseIPDB
AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.GLOBALmalware
Yara Rules
This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules.GLOBALmalware
CrowdSec
CrowdSec is an open-source and collaborative security stack leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Gain crowd-sourced protection against malicious IPs. Benefit from the most accurate CTI in the world.GLOBALmalware
Botvrij
Botvrij provides different sets of open source IOCs that you can use in your security devices to detect possible malicious activity. The information contains network info (IPs), file hashes, file paths, domain names, URLs.GLOBALmalware
BGP Ranking
BGP Ranking is a free software to calculate the security ranking of Internet Service Providers. The system is gathering external datasources (e.g. dshield, shadowserver, Arbor ATLAS) in order to evaluate the ranking over time.GLOBALmalware
War on the Rocks
War on the Rocks is a platform for analysis and debate on strategy, defense, and foreign affairs. It features articles and podcasts produced by an array of writers with deep experience in these matters: top notch scholars who study war, those who have served or worked in war zones, and more than a few who have done it all.GLOBALgeopolitics,terrorism
NOC DNSRepo
Search NOC's DNS repository of IP addresses, domains, and their records. You can search for domains behind an IP address, or all sub domains for a specific domain. You can also do sub domain discovery, find domains behind a specific service and much more.GLOBALnetwork
IntelligenceX
IntelligenceX delivers fast, high-quality results and make the deepest parts of the internet accessible with a few clicks. It searches billions of selectors in a matter of milliseconds. The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc. It searches in places such as the darknet, document sharing platforms, whois data, public data leaks and others. It keeps a historical data archive of results, similar to how the Wayback Machine from archive.org stores historical copies of websites.GLOBALcrypto,network,breach,web,tor
DefaultCreds
One place for all the default credentialsGLOBALexploit
PayloadAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF.GLOBALexploit
HardwareAllTheThings
A list of useful payloads and bypasses for Hardware and IOT Security.GLOBALexploit
Metabigor
Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key.GLOBALnetwork,web
OSINT Curious
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, blogs, instructional videos, online Discord community, and live streams.GLOBALsocial,network,crypto,geopolitics,web,tor
Benjamin Strick
Benjamin Strick creates digital research tutorials and videos for this web generation on Open Source Intelligence (OSINT), digital research, geolocation and curious bytes so that no matter who you are, or where you are in the world, you can learn how to identify, verify and analyse information online.GLOBALsocial,network,crypto,geopolitics,web,tor
Counter Extremism
The Counter Extremism Project (CEP) is a not-for-profit, non-partisan, international policy organization formed to combat the growing threat from extremist ideologies. It strives to build and maintain its best-in-class research and analysis databases on extremist groups, including their ideology, leaders, history, financing, violent activities, tactics, and rhetoric.GLOBALgeopolitics,terrorism
McKinsey Insights
Critical trends and risks in the global economyGLOBALeconomics
Economist Intelligence
Stay current on important trending topics that impact business decisions through EIU curated set of global themes which range from climate change to Covid-19 and digital payments. Learn how global issues are impacting various industries and markets today.GLOBALeconomics
Quiver Quant
Quiver scrapes alternative stock data from across the internet and aggregates it in a free, easy-to-use web dashboard. It allows retail investors to tap into the power of big data, and have access to actionable, easy to interpret data that hasn't already been dissected by Wall Street.GLOBALstocks
MITRE ATT&CK
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.GLOBALmalware
Exploit Alert
Exploits found on the INTERNETGLOBALexploit,vulnerability
XSS Payloads
The wonderland of JavaScript unexpected usages, and more.GLOBALexploit
LOLBAS
The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.GLOBALexploit,malware,vulnerability
GTFOBins
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.GLOBALexploit,vulnerability
0day Today
0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.GLOBALexploit,vulnerability
Rapid7 DB
Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review.GLOBALexploit,vulnerability
Sploitus
Sploitus is a convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities. The search engine is also a good resource for finding security and vulnerability discovery tools.GLOBALexploit,vulnerability
TOR Link
Free anonymous deepweb / darknet search engineGLOBALtor
Rescure
Enhance your cyber security capabilities with highly tailored, accurate and relevant threat intelligence which integrates seamlessly with your detection workflows.GLOBALmalware
Feodo Tracker
Browse the list of botnet Command&Control servers (C&Cs) tracked by Feodo Tracker, associated with Dridex, TrickBot, QakBot (aka QuakBot/Qbot), BazarLoader (aka BazarBackdoor) and Emotet (aka Heodo).GLOBALmalware
Stored Website
View cached web pages/websiteGLOBALweb
ThreatMiner
ThreatMiner is a threat intelligence portal that provides information on indicators of compromise (IOC) such as domains, IP address, malware samples (MD5, SHA1 and SHA256), SSL certificates, WHOIS information and malicious URLs such as phishing and malware links.GLOBALmalware,network,web
YARAify
Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules.With YARAhub, the platform also provides a structured way for sharing YARA rules with the community.GLOBALmalware
PulseDive
Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own.GLOBALmalware,network,web
ThreatFox
Browse the Indicator Of Compromise (IOC) database of ThreatFoxGLOBALmalware
Breach Directory
Check if your information was exposed in a data breachGLOBALbreach
Have I Been Pwned
Check if your email or phone is in a data breachGLOBALbreach
DNSViz
DNSViz is a tool for visualizing the status of a DNS zone. It was designed as a resource for understanding and troubleshooting deployment of the DNS Security Extensions (DNSSEC). It provides a visual analysis of the DNSSEC authentication chain for a domain name and its resolution path in the DNS namespace, and it lists configuration errors detected by the tool.GLOBALnetwork
DNS Twister
The anti-phishing domain name search engine and DNS monitoring serviceGLOBALmalware,network
DNSdumpster
DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.GLOBALnetwork
SpyOnWeb
SpyOnWeb takes the information from public sources, then structure it for your quick and convenient search for the websites that probably belong to the same owner.GLOBALweb,network
Yark
Yark lets you continuously archive all videos and metadata of a YouTube channel, it also lets you view your archive as a seamless offline website with history and historical statistics information.GLOBALweb
CovertAction
Exposing covert action since 1978.GLOBALgeopolitics,terrorism
Trellix Research
The latest cybersecurity trends, best practices, security vulnerabilities, and more from Trellix/Fireeye.GLOBALmalware,exploit,vulnerability
CP Research
Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community.GLOBALmalware,exploit,vulnerability
Wikistrat
Wikistrat is perfectly suited for collaborative analysis, strategic planning, and simulations, thanks to their ability to engage large crowds of experts to collaborate using their interactive online platformGLOBALgeopolitics
PolySwarm
Scan Files or URLs for threatsGLOBALmalware
H1 Hacktivity
Vulnerability Reports disclosed by HackeroneGLOBALexploit,vulnerability
WikiLeaks
WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses.GLOBALbreach,geopolitics
Talos Reports
Vulnerability Reports disclosed by CISCO TalosGLOBALexploit,vulnerability
MalAPI
MalAPI maps Windows APIs to common techniques used by malware. It can be used when developing malware (for legal purposes of course) or when analyzing the source code of one.GLOBALmalware
UserSearch
Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs. 600+ sites Supported! Largest Reverse User Search Online!GLOBALsocial
Domlock
Convert Domains to Netblocks & ASNGLOBALweb
Rescro Sensitives
Regular Expressions for Sensitive TokensGLOBALweb
Favinizer
The Biggest Database of Favicon HashesGLOBALweb
SecureList
The Securelist blog houses Kaspersky's threat intelligence reports, malware research, APT analysis and statisticsGLOBALmalware,exploit,vulnerability
SPLC Hate Map
Each year since 1990, the SPLC has published an annual census of hate groups operating within the United States. The hate map, which depicts the groups' approximate locations, is the result of a year of monitoring by analysts and researchers and is typically published every January or February. It represents activity by hate groups during the previous year.U.S.A.geopolitics,terrorism
ICSR
The International Centre for the Study of Radicalisation (ICSR) is a world-class and internationally acclaimed academic research centre based in the Department of War Studies at King's College London.GLOBALgeopolitics,terrorism
Militant Wire
Militant Wire is a media company focused on providing independent analysis of militant activity and armed conflict around the world. Our global network of researchers produces expert insight on issues of political street violence, terrorism, insurgency, organized crime, irregular warfare, and more.GLOBALgeopolitics,terrorism
START Publications
Publications from a consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism.GLOBALgeopolitics,terrorism
SPLC Resources
Search SPLC publications, cases, Extremist Files, Intelligence Project articles, and more.GLOBALterrorism
Tracking Terrorism
TRAC combines one of the world's largest databases of terrorists, terrorist groups, hate groups and their abettors with original, analytical essays on seminal terrorism topics, profiles of vulnerable regions and cities, and live feed of news and analyses.GLOBALterrorism
Mapping Militants
The Mapping Militants Project identifies patterns in the evolution of militant organizations in specified conflict theatres and provides representations of changing relationships among groups.GLOBALterrorism
NCTC Guide
NCTC serves as the primary organization in the United States Government for analyzing and integrating information pertaining to international terrorism. This Guide focuses on the international terrorist organizations that are assessed to present the most serious threats to the United States.U.S.A.terrorism
Sekurak
News, knowledge, tools, texts - everything related to IT securityGLOBALmalware,breach
Critical Threats
Critical Threats' objective is to inform and educate policymakers, the intelligence and military communities, and all interested citizens who need to understand the nuance and scale of threats to America's security.GLOBALgeopolitcs,terrorism
NTI
NTI is a nonprofit global security organization focused on reducing nuclear and biological threats imperiling humanity.GLOBALgeopolitics
Arms Control
Working to eliminate the threats posed by the world's most dangerous weaponsGLOBALterrorism
ReliefWeb
ReliefWeb is a humanitarian information service provided by the United Nations Office for the Coordination of Humanitarian Affairs (OCHA)GLOBALgeopolitics,terrorism
SIPRI
Stockholm International Peace Research Institute (SIPRI) is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources.GLOBALgeopolitics,terrorism
RUSI
The Royal United Services Institute (RUSI) is the world's oldest and the UK's leading defence and security think tank. Our mission is to inform, influence and enhance public debate to help build a safer and more stable world.GLOBALgeopolitics,terrorism
Conflict Arm
Established in 2011, Conflict Armament Research generates unique evidence on weapon supplies into armed conflicts in order to inform and support effective weapon management and control.GLOBALgeopolitics,terrorism
Crisis Group
The International Crisis Group is an independent organisation working to prevent wars and shape policies that will build a more peaceful world. Crisis Group sounds the alarm to prevent deadly conflict.GLOBALgeopolitics,terrorism
OpenSanctions
OpenSanctions helps investigators find leads, allows companies to manage risk and enables technologists to build data-driven products.GLOBALgeopolitics
CSIS
The Center for Strategic and International Studies (CSIS) is a bipartisan, nonprofit policy research organization dedicated to advancing practical ideas to address the world's greatest challenges. Its purpose is to define the future of national security.GLOBALgeopolitics
Small Arms Survey
For over 20 years, the Small Arms Survey has provided impartial, evidence-based, and policy-relevant knowledge on all aspects of small arms and armed violence to governments, policymakers, researchers, and civil society.GLOBALgeopolitics,terrorism
PRIO
The Peace Research Institute Oslo (PRIO) conducts research on the conditions for peaceful relations between states, groups and people.GLOBALgeopolitics,terrorism
MILEX
Since 1981, many countries have regularly reported their military expenditure to the United Nations. This helps enhance transparency in armaments and contributes to international security by fostering trust and confidence among countries. Access to all information from the UN Report on Military Expenditures database is now a click away.GLOBALterrorism
DataBank
World Development Indicators (WDI) is the primary World Bank collection of development indicators, compiled from officially recognized international sources. It presents the most current and accurate global development data available, and includes national, regional and global estimates.GLOBALeconomics
TI Defence
Transparency International Defence & Security works towards a world where governments, the armed forces, and arms transfers are transparent, accountable, and free from corruption.GLOBALgeopolitics,terrorism
COW
Correlates Of War (COW) seeks to facilitate the collection, dissemination, and use of accurate and reliable quantitative data in international relations.GLOBALgeopolitics,terrorism
VX Underground
The largest collection of malware source code, samples, and papers on the internet.GLOBALmalware,exploit,vulnerability
Maldatabase
Maldatabase is designed to help malware data science and threat intelligence feeds.GLOBALmalware
FraudGuard
FraudGuard is a service designed to provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic. Utilizing just a few simple API endpoints we make integration as simple as possible and return data such as: Risk Level, Threat Type, Geo Location, etc.GLOBALmalware,network,web
Dataplane
Internet engineers, analysts, incident responders, and supporting organizations must be aware of trends, anomalies, threats, and misconfigurations that originate from within and outside their networks. Dataplane.org is a provider of data (signals), analysis, and statistics that increases the awareness which leads to a more robust and secure Internet.GLOBALmalware
Cyware Feeds
Free Cyware Threat Intelligence FeedsGLOBALmalware
MalwareTech
Cyber Security, Tech, Analysis.GLOBALmalware,exploit,vulnerability
OpenPhish
OpenPhish provides actionable intelligence data on active phishing threats.GLOBALphishing
ThreatFeeds
Free and open-source threat intelligence feeds.GLOBALmalware
HoneyDB
HoneyDB provides real time data of honeypot activity. This data comes from honeypot sensors deployed globally on the Internet.GLOBALmalware
AntiScan
Scan your file online with multiple different antiviruses without distributing the results of your scan.GLOBALmalware
Phishing Initiative
Phishing Initiative ables any Internet user to help fight against phishing attacks.GLOBALphishing
ThreatCop Phishing
Phishing URL Checker detects malicious links instantly. It provides you with real-time results to help you detect if a URL is legitimate or a phishing link. So, don't fret if you come across any suspicious links. Just use this phishing link scanner to protect yourself against malicious links, phishing scams and suspicious websites.GLOBALphishing
PhishStats
Fighting phishing and cybercrime since 2014 by gathering, enhancing and sharing phishing information with the infosec community.GLOBALphishing
KitPloit Exploits
KitPloit Exploit Collector is the ultimate collection of public exploits and exploitable vulnerabilities. Remote/Local Exploits, Shellcode and 0days.GLOBALexploit,vulnerability
SeeBug
Seebug is an authoritative security vulnerability community platform for vulnerability reference, sharing and learning, and an authoritative vulnerability library in China.GLOBALexploit,vulnerability
ORF
Set up in 1990, Observer Research Foundation (ORF) seeks to lead and aid policy thinking towards building a strong and prosperous India in a fair and equitable world. It helps discover and inform India's choices, and carries Indian voices and ideas to forums shaping global debates. ORF provides non-partisan, independent analyses and inputs on matters of security, strategy, economy, development, energy, resources and global governance to diverse decision-makers (governments, business communities, academia, civil society). ORF's mandate is to conduct in-depth research, provide inclusive platforms and invest in tomorrow's thought leaders today.GLOBALgeopolitcs,terrorism,economics

About

A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources

https://in.scanfactory.io/intelligence.html

License:Creative Commons Zero v1.0 Universal