Awesome Intelligence 🔗
Feel free to add your contributions to intel.json
TITLE | DESCRIPTION | REGION | TAGS |
---|---|---|---|
CVEMON | CVE Exploits Search Utility | GLOBAL | exploit |
Shodan | Search Engine that lets users search for various types of servers connected to the internet using a variety of filters. | GLOBAL | web,network,vulnerability,image |
NerdyData | Get a list of websites that use certain technologies, plus their company and spend data. Perfect for lead generation, market analysis, and competitive research. | GLOBAL | web |
PublicWWW | Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code. | GLOBAL | web,code |
SearchCode | Search 75 billion lines of code from 40 million projects | GLOBAL | code |
SimilarSites | Easily Explore alternative websites | GLOBAL | web,image |
Netlas | Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets. | GLOBAL | web,network,vulnerability |
CriminalIP | Search for information on anything connected to public internet | GLOBAL | web,network,vulnerability,image |
Kaspersky OpenTIP | Kaspersky Threat Intelligence Portal allows you to scan files, domains, IP addresses, and URLs for threats, malware, viruses. | GLOBAL | malware |
GreyNoise | GreyNoise captures data on IPs that scan the internet and saturate security tools with internet noise, so SOC teams can focus on threats that matter and ignore those that don't. | GLOBAL | web,malware,network |
Intezer Analyze | Malware analysis platform quickly classifying malware and unknown files. Unlike Antivirus and EDRs which mostly produce generic results (think “Trojan.Generic”) and can only classify specific hashes, Intezer analyzes the code itself in order to categorize the threat and classify variants from the same malware family. | GLOBAL | malware |
Chaos Dataset | This project is meant to enhance research and analyse changes around DNS for better insights. | GLOBAL | network |
BBR Dataset | Recon data for public bug bounty programs. | GLOBAL | crypto,network,breach,web,tor |
Arkham Intelligence | Powerful tools for linking cryptocurrency activity to real world individuals and institutions. | GLOBAL | crypto |
AlienVault OTX | A Threat data platform that allows security researchers and threat data producers to share research and investigate new threats. | GLOBAL | malware,network,web |
ExploitDB | An archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. | GLOBAL | exploit |
WhatsMyName | This tool allows you to enumerate usernames across many websites. | GLOBAL | social |
Dehashed | DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine to help secure accounts and provide insight on compromised assets. | GLOBAL | breach |
ManyPasswords | Default passwords for IoT devices and for web applications (for ex. MySQL and PostgreSQL admin panels) | GLOBAL | exploit |
BrandDB | Perform a trademark search by text or image in brand data from multiple national and international sources, including trademarks, appellations of origin and official emblems. | GLOBAL | company |
DNS History | Domain Name System (DNS) Historical Record Archive | GLOBAL | network |
The World Factbook | The World Factbook provides basic intelligence on the history, people, government, economy, energy, geography, environment, communications, transportation, military, terrorism, and transnational issues for 266 world entities. | GLOBAL | geopolitics |
Global Terrorism Catalogue | Catalogue of Terrorist Incidents occurred globally since 1968. | GLOBAL | geopolitics |
Ransom Wiki | Check if your company or partner appears in a claimed ransom attack breach. | GLOBAL | breach |
Xlocate | The ultimate exploits/references finder | GLOBAL | exploit |
Public Intelligence | Public Intelligence is an international, collaborative research project aimed at aggregating the collective work of independent researchers around the globe who wish to defend the public's right to access information. | GLOBAL | geopolitics |
Intelligence Briefs | Strategic Intelligence News publishes intelligence reports, geopolitics, military intelligence, and crime reports analysis. | GLOBAL | geopolitics |
RAND Corporation | The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. | GLOBAL | geopolitics |
ProjectDiscovery | An open-source software company that builds tools to detect and remediate vulnerabilities from development to production. | GLOBAL | network,web,exploit |
BeVigil | The internet's first and only security search engine for mobile apps. | GLOBAL | network,vulnerability |
CINS Army List | CINS Army shares valuable threat intelligence harvested from their CINS system. The CINS Army list is a subset of the CINS Active Threat Intelligence ruleset, and consists of IP addresses having poor recent Rogue Packet score factor or have tripped a designated number of trusted alerts across a given number of their Sentinels deployed around the world. | GLOBAL | malware,network |
Umbrella List | The popularity list contains most queried domains based on passive DNS usage across Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries. | GLOBAL | network |
MalwareBazaar | MalwareBazaar is a project from abuse.ch with the goal of sharing malware samples with the infosec community, AV vendors and threat intelligence providers. | GLOBAL | malware |
BD Banlist | Binary Defense Systems Artillery Threat Intelligence Feed and Banlist Feed | GLOBAL | malware |
AbuseIPDB | AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. | GLOBAL | malware |
Yara Rules | This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules. | GLOBAL | malware |
CrowdSec | CrowdSec is an open-source and collaborative security stack leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Gain crowd-sourced protection against malicious IPs. Benefit from the most accurate CTI in the world. | GLOBAL | malware |
Botvrij | Botvrij provides different sets of open source IOCs that you can use in your security devices to detect possible malicious activity. The information contains network info (IPs), file hashes, file paths, domain names, URLs. | GLOBAL | malware |
BGP Ranking | BGP Ranking is a free software to calculate the security ranking of Internet Service Providers. The system is gathering external datasources (e.g. dshield, shadowserver, Arbor ATLAS) in order to evaluate the ranking over time. | GLOBAL | malware |
War on the Rocks | War on the Rocks is a platform for analysis and debate on strategy, defense, and foreign affairs. It features articles and podcasts produced by an array of writers with deep experience in these matters: top notch scholars who study war, those who have served or worked in war zones, and more than a few who have done it all. | GLOBAL | geopolitics |
NOC DNSRepo | Search NOC's DNS repository of IP addresses, domains, and their records. You can search for domains behind an IP address, or all sub domains for a specific domain. You can also do sub domain discovery, find domains behind a specific service and much more. | GLOBAL | network |
IntelligenceX | IntelligenceX delivers fast, high-quality results and make the deepest parts of the internet accessible with a few clicks. It searches billions of selectors in a matter of milliseconds. The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc. It searches in places such as the darknet, document sharing platforms, whois data, public data leaks and others. It keeps a historical data archive of results, similar to how the Wayback Machine from archive.org stores historical copies of websites. | GLOBAL | crypto,network,breach,web,tor |
DefaultCreds | One place for all the default credentials | GLOBAL | exploit |
PayloadAllTheThings | A list of useful payloads and bypass for Web Application Security and Pentest/CTF. | GLOBAL | exploit |
HardwareAllTheThings | A list of useful payloads and bypasses for Hardware and IOT Security. | GLOBAL | exploit |
Metabigor | Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key. | GLOBAL | network |
OSINT Curious | The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, blogs, instructional videos, online Discord community, and live streams. | GLOBAL | social,network,crypto,geopolitics,web,tor |
Benjamin Strick | Benjamin Strick creates digital research tutorials and videos for this web generation on Open Source Intelligence (OSINT), digital research, geolocation and curious bytes so that no matter who you are, or where you are in the world, you can learn how to identify, verify and analyse information online. | GLOBAL | social,network,crypto,geopolitics,web,tor |
Counter Extremism | The Counter Extremism Project (CEP) is a not-for-profit, non-partisan, international policy organization formed to combat the growing threat from extremist ideologies. | GLOBAL | geopolitics |
McKinsey Insights | Critical trends and risks in the global economy | GLOBAL | economics |
Economist Intelligence | Stay current on important trending topics that impact business decisions through EIU curated set of global themes which range from climate change to Covid-19 and digital payments. Learn how global issues are impacting various industries and markets today. | GLOBAL | economics |
Quiver Quant | Quiver scrapes alternative stock data from across the internet and aggregates it in a free, easy-to-use web dashboard. It allows retail investors to tap into the power of big data, and have access to actionable, easy to interpret data that hasn't already been dissected by Wall Street. | GLOBAL | stocks |
MITRE ATT&CK | MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. | GLOBAL | malware |
Exploit Alert | Exploits found on the INTERNET | GLOBAL | exploit |
XSS Payloads | The wonderland of JavaScript unexpected usages, and more. | GLOBAL | exploit |
LOLBAS | The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques. | GLOBAL | exploit,malware |
GTFOBins | GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. | GLOBAL | exploit |
0day Today | 0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. | GLOBAL | exploit |
Rapid7 DB | Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. | GLOBAL | exploit |
Sploitus | Sploitus is a convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities. The search engine is also a good resource for finding security and vulnerability discovery tools. | GLOBAL | exploit |
TOR Link | Free anonymous deepweb / darknet search engine | GLOBAL | tor |