Gathers and synthesizes open-source intelligence (OSINT) to identify threat actor infrastructure and malicious campaigns using passive reconnaissance techniques.
This skill empowers Claude to perform sophisticated open-source intelligence (OSINT) operations, specializing in the identification and synthesis of data regarding threat actors and malicious infrastructure. It provides structured workflows for passive reconnaissance, utilizing tools like Shodan and Maltego to map attack surfaces and discover hidden subdomains via certificate transparency logs without alerting targets. By automating the correlation of disparate data points such as ASN data, WHOIS records, and dark web mentions, it enables security professionals to rapidly enrich cyber threat intelligence (CTI) reports and conduct thorough pre-engagement assessments for authorized red team activities.
主な機能
01Dark web and paste site monitoring for leaked credentials
02Passive infrastructure mapping via DNS and WHOIS history
03Automated Shodan queries for internet-wide service discovery
04Certificate transparency log analysis for subdomain discovery
054,121 GitHub stars
06Graph-based link analysis workflows for Maltego
ユースケース
01Investigating external infrastructure associated with phishing campaigns
02Enriching threat actor profiles with publicly observable indicators and ASN data
03Conducting authorized attack surface discovery to identify external exposure