Awesome Intelligence 🔗
Feel free to add your contributions to intel.json
Supported Tags
network
, web
, malware
, vulnerability
, exploit
, code
, image
, geopolitics
, crypto
, breach
, economics
, social
, stocks
, tor
, terrorism
, phishing
TITLE | DESCRIPTION | REGION | TAGS |
---|---|---|---|
CVEMON | CVE Exploits Search Utility | GLOBAL | exploit |
Shodan | Search Engine that lets users search for various types of servers connected to the internet using a variety of filters. | GLOBAL | web,network,vulnerability,image |
Censys Search | Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security. | GLOBAL | web,network |
NerdyData | Get a list of websites that use certain technologies, plus their company and spend data. Perfect for lead generation, market analysis, and competitive research. | GLOBAL | web |
PublicWWW | Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code. | GLOBAL | web,code |
SearchCode | Search 75 billion lines of code from 40 million projects | GLOBAL | code |
SimilarSites | Easily Explore alternative websites | GLOBAL | web,image |
Netlas | Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets. | GLOBAL | web,network,vulnerability |
CriminalIP | Search for information on anything connected to public internet | GLOBAL | web,network,vulnerability,image |
Kaspersky OpenTIP | Kaspersky Threat Intelligence Portal allows you to scan files, domains, IP addresses, and URLs for threats, malware, viruses. | GLOBAL | malware |
GreyNoise | GreyNoise captures data on IPs that scan the internet and saturate security tools with internet noise, so SOC teams can focus on threats that matter and ignore those that don't. | GLOBAL | web,malware,network |
Intezer Analyze | Malware analysis platform quickly classifying malware and unknown files. Unlike Antivirus and EDRs which mostly produce generic results (think “Trojan.Generic”) and can only classify specific hashes, Intezer analyzes the code itself in order to categorize the threat and classify variants from the same malware family. | GLOBAL | malware |
Chaos Dataset | This project is meant to enhance research and analyse changes around DNS for better insights. | GLOBAL | network |
BBR Dataset | Recon data for public bug bounty programs. | GLOBAL | network,web |
Arkham Intelligence | Powerful tools for linking cryptocurrency activity to real world individuals and institutions. | GLOBAL | crypto |
AlienVault OTX | A Threat data platform that allows security researchers and threat data producers to share research and investigate new threats. | GLOBAL | malware,network,web |
ExploitDB | An archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. | GLOBAL | exploit,vulnerability |
WhatsMyName | This tool allows you to enumerate usernames across many websites. | GLOBAL | social |
Dehashed | DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine to help secure accounts and provide insight on compromised assets. | GLOBAL | breach |
ManyPasswords | Default passwords for IoT devices and for web applications (for ex. MySQL and PostgreSQL admin panels) | GLOBAL | exploit |
BrandDB | Perform a trademark search by text or image in brand data from multiple national and international sources, including trademarks, appellations of origin and official emblems. | GLOBAL | company |
DNS History | Domain Name System (DNS) Historical Record Archive | GLOBAL | network |
The World Factbook | The World Factbook provides basic intelligence on the history, people, government, economy, energy, geography, environment, communications, transportation, military, terrorism, and transnational issues for 266 world entities. | GLOBAL | geopolitics,terrorism,economics |
Global Terrorism Catalogue | Catalogue of Terrorist Incidents occurred globally since 1968. | GLOBAL | terrorism |
Ransom Wiki | Check if your company or partner appears in a claimed ransom attack breach. | GLOBAL | breach |
Xlocate | The ultimate exploits/references finder | GLOBAL | exploit |
Public Intelligence | Public Intelligence is an international, collaborative research project aimed at aggregating the collective work of independent researchers around the globe who wish to defend the public's right to access information. | GLOBAL | geopolitics |
Intelligence Briefs | Strategic Intelligence News publishes intelligence reports, geopolitics, military intelligence, and crime reports analysis. | GLOBAL | geopolitics,terrorism |
RAND Corporation | The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. | GLOBAL | geopolitics,terrorism |
ProjectDiscovery | An open-source software company that builds tools to detect and remediate vulnerabilities from development to production. | GLOBAL | network,web,exploit,vulnerability |
BeVigil | The internet's first and only security search engine for mobile apps. | GLOBAL | network,vulnerability |
CINS Army List | CINS Army shares valuable threat intelligence harvested from their CINS system. The CINS Army list is a subset of the CINS Active Threat Intelligence ruleset, and consists of IP addresses having poor recent Rogue Packet score factor or have tripped a designated number of trusted alerts across a given number of their Sentinels deployed around the world. | GLOBAL | malware,network |
Umbrella List | The popularity list contains most queried domains based on passive DNS usage across Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries. | GLOBAL | network |
MalwareBazaar | MalwareBazaar is a project from abuse.ch with the goal of sharing malware samples with the infosec community, AV vendors and threat intelligence providers. | GLOBAL | malware |
BD Banlist | Binary Defense Systems Artillery Threat Intelligence Feed and Banlist Feed | GLOBAL | malware |
AbuseIPDB | AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. | GLOBAL | malware |
Yara Rules | This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules. | GLOBAL | malware |
CrowdSec | CrowdSec is an open-source and collaborative security stack leveraging the crowd power. Analyze behaviors, respond to attacks & share signals across the community. Gain crowd-sourced protection against malicious IPs. Benefit from the most accurate CTI in the world. | GLOBAL | malware |
Botvrij | Botvrij provides different sets of open source IOCs that you can use in your security devices to detect possible malicious activity. The information contains network info (IPs), file hashes, file paths, domain names, URLs. | GLOBAL | malware |
BGP Ranking | BGP Ranking is a free software to calculate the security ranking of Internet Service Providers. The system is gathering external datasources (e.g. dshield, shadowserver, Arbor ATLAS) in order to evaluate the ranking over time. | GLOBAL | malware |
War on the Rocks | War on the Rocks is a platform for analysis and debate on strategy, defense, and foreign affairs. It features articles and podcasts produced by an array of writers with deep experience in these matters: top notch scholars who study war, those who have served or worked in war zones, and more than a few who have done it all. | GLOBAL | geopolitics,terrorism |
NOC DNSRepo | Search NOC's DNS repository of IP addresses, domains, and their records. You can search for domains behind an IP address, or all sub domains for a specific domain. You can also do sub domain discovery, find domains behind a specific service and much more. | GLOBAL | network |
IntelligenceX | IntelligenceX delivers fast, high-quality results and make the deepest parts of the internet accessible with a few clicks. It searches billions of selectors in a matter of milliseconds. The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc. It searches in places such as the darknet, document sharing platforms, whois data, public data leaks and others. It keeps a historical data archive of results, similar to how the Wayback Machine from archive.org stores historical copies of websites. | GLOBAL | crypto,network,breach,web,tor |
DefaultCreds | One place for all the default credentials | GLOBAL | exploit |
PayloadAllTheThings | A list of useful payloads and bypass for Web Application Security and Pentest/CTF. | GLOBAL | exploit |
HardwareAllTheThings | A list of useful payloads and bypasses for Hardware and IOT Security. | GLOBAL | exploit |
Metabigor | Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key. | GLOBAL | network,web |
OSINT Curious | The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, blogs, instructional videos, online Discord community, and live streams. | GLOBAL | social,network,crypto,geopolitics,web,tor |
Benjamin Strick | Benjamin Strick creates digital research tutorials and videos for this web generation on Open Source Intelligence (OSINT), digital research, geolocation and curious bytes so that no matter who you are, or where you are in the world, you can learn how to identify, verify and analyse information online. | GLOBAL | social,network,crypto,geopolitics,web,tor |
Counter Extremism | The Counter Extremism Project (CEP) is a not-for-profit, non-partisan, international policy organization formed to combat the growing threat from extremist ideologies. It strives to build and maintain its best-in-class research and analysis databases on extremist groups, including their ideology, leaders, history, financing, violent activities, tactics, and rhetoric. | GLOBAL | geopolitics,terrorism |
McKinsey Insights | Critical trends and risks in the global economy | GLOBAL | economics |
Economist Intelligence | Stay current on important trending topics that impact business decisions through EIU curated set of global themes which range from climate change to Covid-19 and digital payments. Learn how global issues are impacting various industries and markets today. | GLOBAL | economics |
Quiver Quant | Quiver scrapes alternative stock data from across the internet and aggregates it in a free, easy-to-use web dashboard. It allows retail investors to tap into the power of big data, and have access to actionable, easy to interpret data that hasn't already been dissected by Wall Street. | GLOBAL | stocks |
MITRE ATT&CK | MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. | GLOBAL | malware |
Exploit Alert | Exploits found on the INTERNET | GLOBAL | exploit,vulnerability |
XSS Payloads | The wonderland of JavaScript unexpected usages, and more. | GLOBAL | exploit |
LOLBAS | The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques. | GLOBAL | exploit,malware,vulnerability |
GTFOBins | GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. | GLOBAL | exploit,vulnerability |
0day Today | 0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. | GLOBAL | exploit,vulnerability |
Rapid7 DB | Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. | GLOBAL | exploit,vulnerability |
Sploitus | Sploitus is a convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities. The search engine is also a good resource for finding security and vulnerability discovery tools. | GLOBAL | exploit,vulnerability |
TOR Link | Free anonymous deepweb / darknet search engine | GLOBAL | tor |
Rescure | Enhance your cyber security capabilities with highly tailored, accurate and relevant threat intelligence which integrates seamlessly with your detection workflows. | GLOBAL | malware |
Feodo Tracker | Browse the list of botnet Command&Control servers (C&Cs) tracked by Feodo Tracker, associated with Dridex, TrickBot, QakBot (aka QuakBot/Qbot), BazarLoader (aka BazarBackdoor) and Emotet (aka Heodo). | GLOBAL | malware |
Stored Website | View cached web pages/website | GLOBAL | web |
ThreatMiner | ThreatMiner is a threat intelligence portal that provides information on indicators of compromise (IOC) such as domains, IP address, malware samples (MD5, SHA1 and SHA256), SSL certificates, WHOIS information and malicious URLs such as phishing and malware links. | GLOBAL | malware,network,web |
YARAify | Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules.With YARAhub, the platform also provides a structured way for sharing YARA rules with the community. | GLOBAL | malware |
PulseDive | Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own. | GLOBAL | malware,network,web |
ThreatFox | Browse the Indicator Of Compromise (IOC) database of ThreatFox | GLOBAL | malware |
Breach Directory | Check if your information was exposed in a data breach | GLOBAL | breach |
Have I Been Pwned | Check if your email or phone is in a data breach | GLOBAL | breach |
DNSViz | DNSViz is a tool for visualizing the status of a DNS zone. It was designed as a resource for understanding and troubleshooting deployment of the DNS Security Extensions (DNSSEC). It provides a visual analysis of the DNSSEC authentication chain for a domain name and its resolution path in the DNS namespace, and it lists configuration errors detected by the tool. | GLOBAL | network |
DNS Twister | The anti-phishing domain name search engine and DNS monitoring service | GLOBAL | malware,network |
DNSdumpster | DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process. | GLOBAL | network |
SpyOnWeb | SpyOnWeb takes the information from public sources, then structure it for your quick and convenient search for the websites that probably belong to the same owner. | GLOBAL | web,network |
Yark | Yark lets you continuously archive all videos and metadata of a YouTube channel, it also lets you view your archive as a seamless offline website with history and historical statistics information. | GLOBAL | web |
CovertAction | Exposing covert action since 1978. | GLOBAL | geopolitics,terrorism |
Trellix Research | The latest cybersecurity trends, best practices, security vulnerabilities, and more from Trellix/Fireeye. | GLOBAL | malware,exploit,vulnerability |
CP Research | Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. | GLOBAL | malware,exploit,vulnerability |
Wikistrat | Wikistrat is perfectly suited for collaborative analysis, strategic planning, and simulations, thanks to their ability to engage large crowds of experts to collaborate using their interactive online platform | GLOBAL | geopolitics |
PolySwarm | Scan Files or URLs for threats | GLOBAL | malware |
H1 Hacktivity | Vulnerability Reports disclosed by Hackerone | GLOBAL | exploit,vulnerability |
WikiLeaks | WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption. It has so far published more than 10 million documents and associated analyses. | GLOBAL | breach,geopolitics |
Talos Reports | Vulnerability Reports disclosed by CISCO Talos | GLOBAL | exploit,vulnerability |
MalAPI | MalAPI maps Windows APIs to common techniques used by malware. It can be used when developing malware (for legal purposes of course) or when analyzing the source code of one. | GLOBAL | malware |
UserSearch | Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs. 600+ sites Supported! Largest Reverse User Search Online! | GLOBAL | social |
Domlock | Convert Domains to Netblocks & ASN | GLOBAL | web |
Rescro Sensitives | Regular Expressions for Sensitive Tokens | GLOBAL | web |
Favinizer | The Biggest Database of Favicon Hashes | GLOBAL | web |
SecureList | The Securelist blog houses Kaspersky's threat intelligence reports, malware research, APT analysis and statistics | GLOBAL | malware,exploit,vulnerability |
SPLC Hate Map | Each year since 1990, the SPLC has published an annual census of hate groups operating within the United States. The hate map, which depicts the groups' approximate locations, is the result of a year of monitoring by analysts and researchers and is typically published every January or February. It represents activity by hate groups during the previous year. | U.S.A. | geopolitics,terrorism |
ICSR | The International Centre for the Study of Radicalisation (ICSR) is a world-class and internationally acclaimed academic research centre based in the Department of War Studies at King's College London. | GLOBAL | geopolitics,terrorism |
Militant Wire | Militant Wire is a media company focused on providing independent analysis of militant activity and armed conflict around the world. Our global network of researchers produces expert insight on issues of political street violence, terrorism, insurgency, organized crime, irregular warfare, and more. | GLOBAL | geopolitics,terrorism |
START Publications | Publications from a consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism. | GLOBAL | geopolitics,terrorism |
SPLC Resources | Search SPLC publications, cases, Extremist Files, Intelligence Project articles, and more. | GLOBAL | terrorism |
Tracking Terrorism | TRAC combines one of the world's largest databases of terrorists, terrorist groups, hate groups and their abettors with original, analytical essays on seminal terrorism topics, profiles of vulnerable regions and cities, and live feed of news and analyses. | GLOBAL | terrorism |
Mapping Militants | The Mapping Militants Project identifies patterns in the evolution of militant organizations in specified conflict theatres and provides representations of changing relationships among groups. | GLOBAL | terrorism |
NCTC Guide | NCTC serves as the primary organization in the United States Government for analyzing and integrating information pertaining to international terrorism. This Guide focuses on the international terrorist organizations that are assessed to present the most serious threats to the United States. | U.S.A. | terrorism |
Sekurak | News, knowledge, tools, texts - everything related to IT security | GLOBAL | malware,breach |
Critical Threats | Critical Threats' objective is to inform and educate policymakers, the intelligence and military communities, and all interested citizens who need to understand the nuance and scale of threats to America's security. | GLOBAL | geopolitcs,terrorism |
NTI | NTI is a nonprofit global security organization focused on reducing nuclear and biological threats imperiling humanity. | GLOBAL | geopolitics |
Arms Control | Working to eliminate the threats posed by the world's most dangerous weapons | GLOBAL | terrorism |
ReliefWeb | ReliefWeb is a humanitarian information service provided by the United Nations Office for the Coordination of Humanitarian Affairs (OCHA) | GLOBAL | geopolitics,terrorism |
SIPRI | Stockholm International Peace Research Institute (SIPRI) is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources. | GLOBAL | geopolitics,terrorism |
RUSI | The Royal United Services Institute (RUSI) is the world's oldest and the UK's leading defence and security think tank. Our mission is to inform, influence and enhance public debate to help build a safer and more stable world. | GLOBAL | geopolitics,terrorism |
Conflict Arm | Established in 2011, Conflict Armament Research generates unique evidence on weapon supplies into armed conflicts in order to inform and support effective weapon management and control. | GLOBAL | geopolitics,terrorism |
Crisis Group | The International Crisis Group is an independent organisation working to prevent wars and shape policies that will build a more peaceful world. Crisis Group sounds the alarm to prevent deadly conflict. | GLOBAL | geopolitics,terrorism |
OpenSanctions | OpenSanctions helps investigators find leads, allows companies to manage risk and enables technologists to build data-driven products. | GLOBAL | geopolitics |
CSIS | The Center for Strategic and International Studies (CSIS) is a bipartisan, nonprofit policy research organization dedicated to advancing practical ideas to address the world's greatest challenges. Its purpose is to define the future of national security. | GLOBAL | geopolitics |
Small Arms Survey | For over 20 years, the Small Arms Survey has provided impartial, evidence-based, and policy-relevant knowledge on all aspects of small arms and armed violence to governments, policymakers, researchers, and civil society. | GLOBAL | geopolitics,terrorism |
PRIO | The Peace Research Institute Oslo (PRIO) conducts research on the conditions for peaceful relations between states, groups and people. | GLOBAL | geopolitics,terrorism |
MILEX | Since 1981, many countries have regularly reported their military expenditure to the United Nations. This helps enhance transparency in armaments and contributes to international security by fostering trust and confidence among countries. Access to all information from the UN Report on Military Expenditures database is now a click away. | GLOBAL | terrorism |
DataBank | World Development Indicators (WDI) is the primary World Bank collection of development indicators, compiled from officially recognized international sources. It presents the most current and accurate global development data available, and includes national, regional and global estimates. | GLOBAL | economics |
TI Defence | Transparency International Defence & Security works towards a world where governments, the armed forces, and arms transfers are transparent, accountable, and free from corruption. | GLOBAL | geopolitics,terrorism |
COW | Correlates Of War (COW) seeks to facilitate the collection, dissemination, and use of accurate and reliable quantitative data in international relations. | GLOBAL | geopolitics,terrorism |
VX Underground | The largest collection of malware source code, samples, and papers on the internet. | GLOBAL | malware,exploit,vulnerability |
Maldatabase | Maldatabase is designed to help malware data science and threat intelligence feeds. | GLOBAL | malware |
FraudGuard | FraudGuard is a service designed to provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic. Utilizing just a few simple API endpoints we make integration as simple as possible and return data such as: Risk Level, Threat Type, Geo Location, etc. | GLOBAL | malware,network,web |
Dataplane | Internet engineers, analysts, incident responders, and supporting organizations must be aware of trends, anomalies, threats, and misconfigurations that originate from within and outside their networks. Dataplane.org is a provider of data (signals), analysis, and statistics that increases the awareness which leads to a more robust and secure Internet. | GLOBAL | malware |
Cyware Feeds | Free Cyware Threat Intelligence Feeds | GLOBAL | malware |
MalwareTech | Cyber Security, Tech, Analysis. | GLOBAL | malware,exploit,vulnerability |
OpenPhish | OpenPhish provides actionable intelligence data on active phishing threats. | GLOBAL | phishing |
ThreatFeeds | Free and open-source threat intelligence feeds. | GLOBAL | malware |
HoneyDB | HoneyDB provides real time data of honeypot activity. This data comes from honeypot sensors deployed globally on the Internet. | GLOBAL | malware |
AntiScan | Scan your file online with multiple different antiviruses without distributing the results of your scan. | GLOBAL | malware |
Phishing Initiative | Phishing Initiative ables any Internet user to help fight against phishing attacks. | GLOBAL | phishing |
ThreatCop Phishing | Phishing URL Checker detects malicious links instantly. It provides you with real-time results to help you detect if a URL is legitimate or a phishing link. So, don't fret if you come across any suspicious links. Just use this phishing link scanner to protect yourself against malicious links, phishing scams and suspicious websites. | GLOBAL | phishing |
PhishStats | Fighting phishing and cybercrime since 2014 by gathering, enhancing and sharing phishing information with the infosec community. | GLOBAL | phishing |
KitPloit Exploits | KitPloit Exploit Collector is the ultimate collection of public exploits and exploitable vulnerabilities. Remote/Local Exploits, Shellcode and 0days. | GLOBAL | exploit,vulnerability |
SeeBug | Seebug is an authoritative security vulnerability community platform for vulnerability reference, sharing and learning, and an authoritative vulnerability library in China. | GLOBAL | exploit,vulnerability |
ORF | Set up in 1990, Observer Research Foundation (ORF) seeks to lead and aid policy thinking towards building a strong and prosperous India in a fair and equitable world. It helps discover and inform India's choices, and carries Indian voices and ideas to forums shaping global debates. ORF provides non-partisan, independent analyses and inputs on matters of security, strategy, economy, development, energy, resources and global governance to diverse decision-makers (governments, business communities, academia, civil society). ORF's mandate is to conduct in-depth research, provide inclusive platforms and invest in tomorrow's thought leaders today. | GLOBAL | geopolitcs,terrorism,economics |