OSINT Directory

Map. Discover. Verify.

New

Threat Intelligence Playbook

Aggregate dark web chatter, leak databases, and TTP monitoring feeds for comprehensive threat analysis.

Recommended Tools

Have I Been Pwned

Check for data breaches

VirusTotal

Malware and threat analysis

MISP

Threat intelligence platform

AlienVault OTX

Open threat exchange

Investigation Steps

  1. 1

    Identify indicators of compromise (IOCs)

  2. 2

    Search threat intelligence databases and feeds

  3. 3

    Analyze dark web forums and leak sites

  4. 4

    Correlate findings with known threat actors

  5. 5

    Document TTPs and create threat reports

Quick Wins

  • Check email addresses and domains in breach databases
  • Monitor threat intelligence feeds for emerging threats
  • Use MISP to share and correlate threat indicators