A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.
-
Updated
Oct 29, 2025
A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
Here's samples of android/ios spyware named "Pegasus" made by the NSOGROUP
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Graph Representation of MITRE ATT&CK's CTI data
A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Needs, developed by those in trenches.
A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachForums, LeakBase, & more
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Sharing our knowledge and resources in the field of cyber security.
The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products, versions, CVEs, etc.
SACTI - Securely aggregate CTI sightings and report them on MISP
A new way for you to structure your threat content.
This directory contains a templates for you to build your own system.
Criminal IP is a comprehensive OSINT-based Cyber Threat Intelligence (CTI) search engine that can be used as an automated Attack Surface Management solution.
Experimental RAG that consumes Cyber Security articles via RSS
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
Phishing Url detector detects cyber thefts and cyber frauds using machine learning and data science technology. TECH used- Python, Django(Backend), SQLite, IBM cloud, data science, machine learning.
Dataset Release on our paper, Threat Behavior Textual Search by Attention Graph Ismorphism
Data Analysis of iSoon's Leaked Data Dump
Add a description, image, and links to the cyberthreatintelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyberthreatintelligence topic, visit your repo's landing page and select "manage topics."