Loading...
Browse 24 intelligence gathering tools
OSINT tool for digital identity investigation across 600+ public sources.
OSINT-driven link analysis tool for mapping entity relationships visually.
Managed intel service delivering analyst-driven reports from open & dark web sources.
Data fusion platform supporting the full intelligence cycle for security agencies.
Threat intel firm identifying human actors behind cyber threats.
Upcoming offensive/defensive cyber intel product targeting national security agencies.
Managed dark/deep/surface web threat actor monitoring and intelligence service.
Defense & technology company offering govt/military security & comms solutions.
Collaborative threat intel portal with MITRE ATT&CK mapping & sharing
Leaked data intelligence platform with 40TB+ database for breach tracking
Dark web and surface web crawler for content discovery and archiving
Investigation platform for digital forensics and incident analysis
Data analysis platform for transforming data into actionable intelligence
AI-driven NDR platform enabling real-time threat intelligence sharing across orgs
A Python API client for BuiltWith that enables programmatic access to website technology profiling and reconnaissance data.
A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.
Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data.
Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.
An interactive command line application for Open Source Intelligence collection and artifact management that enables investigation of IP addresses, domains, email addresses, file hashes, and other digital artifacts.
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.
ActorTrackr is an open source web application for storing, searching, and linking threat actor intelligence data from public repositories and user contributions.
Get strategic cybersecurity insights in your inbox