The Wayback Machine - https://web.archive.org/web/20230520103030/http://github.com/fastfire/deepdarkCTI/
Skip to content

fastfire/deepdarkCTI

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
May 31, 2021 12:22
June 25, 2022 23:02
May 31, 2022 17:15
February 21, 2023 23:16
August 16, 2022 20:56
January 27, 2023 00:20
May 15, 2023 13:54
October 18, 2022 14:45
Fix
May 19, 2023 20:38
June 9, 2022 10:39
May 18, 2023 15:50
February 15, 2023 22:18

deepdarkCTI

Collection of Cyber Threat Intelligence sources from the Deep and Dark Web

The aim of this project is to collect the sources, present in the Deep and Dark web, which can be useful in Cyber Threat Intelligence contexts.

The contributors of the project (or people active in the field of Cyber Threat Intelligence) have a Telegram groups available to propose new sources to be integrated within the project and to have a place to discuss the tactics and techniques of research and analysis that are used daily. It is possible to request access to the Telegram group by sending a request to https://t.me/fastfire83

Or, if you want to contribute with a donation, you can. We added this possibility because it was requested by some followers of the project. The donations, as well as the use of the same, will be managed in total transparency and will be used exclusively to build resources related to the deepdarkCTI project.

Buy Me A Coffee

What is Cyber Threat Intelligence?

Cyber Threat Intelligence (CTI) is defined as the collection and analysis of information about threats and adversaries and drawing patterns that provide an ability to make knowledgeable decisions for the preparedness, prevention and response actions against various cyber attacks.

CTI involves collecting, researching and analyzing trends and technical developments in the area of cyber threats and if often presented in the form of Indicators of Compromise (IoCs) or threat feeds, provides evidence-base knowledge regarding an organization's unique threat landscape.

In Cyber Threat Intelligence, analysis if performed based on the intent, capability and opportunity triad. With the study of this triad, experts can evaluate and make informed, forward-learning strategic, operational and tactical decisions on existing or emerging threats to the organization.

There are three types of Threat Intelligence:

Strategic - provides high-level information regarding cyber security posture, threats and its impact on business.

Tactical - provides information related to threat actor's Tactics, Techniques and Procedures (TTPs) used to perform attacks.

Operational - provides information about specific threats against the organization.

Typical sources of intelligence are:

  • Open Source Intelligence (OSINT)
  • Human Intelligence
  • Counter Intelligence
  • Internal Intelligence

Through this project, which takes into consideration the OSINT sources related to the Deep and Dark Web domain, we aim to monitor the intelligence information present in the following sources:

  • Telegram channels, groups and chats
  • Discord channels
  • ransomware gangs sites
  • forums related to cyber criminal activities and data leaks
  • markets
  • exploits databases
  • Twitter accounts
  • RaaS (Ransomware As A Service) sites

In addition, within the methods file, various techniques for searching and analyzing sources are described.

Star History

Star History Chart

About

Collection of Cyber Threat Intelligence sources from the deep and dark web

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published