Skip to content

This repository contains detailed open-source intelligence (OSINT) investigations on phishing campaigns, scam websites, and other cyber threat actors. All reports are based on publicly observable data and aim to provide insights for security researchers, organizations, and the community.

Notifications You must be signed in to change notification settings

atomlab1/osint-threat-database

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 

Repository files navigation

AtomLab1 – Digital Risk & OSINT Threat Intelligence Database

Overview

AtomLab1 is an independent digital risk and open-source intelligence (OSINT) research initiative focused on identifying, analyzing, and documenting online scam and phishing infrastructure.

This repository serves as a structured intelligence archive of real-world investigations into:

  • Phishing campaigns
  • Brand impersonation websites
  • Wallet drainer operations
  • Fraudulent online platforms
  • Malicious APK distribution
  • Scam infrastructure and attacker tooling

All investigations are conducted using publicly accessible information and follow strict ethical OSINT principles.

AtomLab1 emphasizes structured evidence documentation, infrastructure pattern recognition, and intelligence-grade reporting discipline.


Mission

The objective of AtomLab1 is to:

  • Detect newly emerging scam infrastructure
  • Analyze attacker tactics, techniques, and procedures (TTPs)
  • Correlate malicious infrastructure patterns across campaigns
  • Extract actionable Indicators of Compromise (IOCs)
  • Develop structured digital risk investigation methodology
  • Promote awareness and defensive intelligence practices

This project reflects a proactive digital risk detection mindset rather than reactive incident reporting.


OSINT & CTI Research Methodology

This document defines the standardized, repeatable methodology used for every CTI report in this portfolio. All tools are free / open-source or have generous free tiers. No paid enterprise licenses required.

1. Core Principles & Ethical Guidelines

  • Passive-first approach
  • Multi-source verification
  • Reproducibility & zero-harm testing
  • Attack Chain Reconstruction (Cyber Kill Chain + MITRE ATT&CK)

2. Standard Research Workflow

  1. Target Identification & Triage
  2. Domain / Infrastructure Recon
  3. Web & Traffic Analysis
  4. APK / Malware Analysis
  5. Scam / Threat Feed Cross-Check
  6. Web3 / Blockchain Tracing
  7. Attack Chain & Risk Assessment
  8. Professional Report Writing

3. Tools & Resources by Category (Awesome-Style Directory)

3.1 Domain & Infrastructure Reconnaissance

  • AtSameIP - Find all websites hosted on the same host (IP-address)
  • subfinder – Fast passive subdomain enumeration (download latest release)
  • Amass – OWASP attack surface mapping & asset discovery
  • findomain – Cross-platform subdomain enumerator
  • assetfinder – Passive asset discovery
  • Sublist3r – Subdomain enumeration (Python)
  • SecurityTrails – Historical & passive DNS (free tier)
  • DNSDumpster – Free DNS reconnaissance web tool
  • Censys – Internet-wide asset search (free account)
  • Shodan – Search engine for Internet-connected devices (free tier)
  • Wayback Machine – Historical website snapshots
  • Recon-ng – Full-featured reconnaissance framework
  • theHarvester – Email, subdomain & employee OSINT
  • SpiderFoot – Automated OSINT collection & correlation
  • gobuster – Directory & DNS brute-forcing
  • feroxbuster – Fast recursive content discovery
  • dirb – Classic web content scanner
  • katana – Next-generation crawling & spidering (ProjectDiscovery)
  • nmap – Network discovery & security auditing
  • Wappalyzer – Web technology fingerprinting (browser extension + online)
  • BuiltWith – Website technology profiler
  • WhatWeb – Website identification engine

3.2 Web Investigation & Traffic Analysis

3.3 Scam, Phishing & Threat Monitoring Feeds / Websites

3.4 APK / Mobile Malware Analysis

  • MobSF (Mobile Security Framework) – All-in-one Android/iOS/Windows analysis (official repo + Docker)
  • Apktool – Android APK reverse engineering
  • Jadx-GUI – Dex to Java decompiler (GUI version)
  • Frida – Dynamic instrumentation toolkit
  • Ghidra – NSA reverse-engineering framework (download)

3.5 Web3 / Blockchain OSINT (Crypto Scams & Wallet Drainers)

Explorers

3.6 General OSINT & Automation Tools

3.7 Curated Awesome Lists (One-Click Starting Points)

3.8 Additional Threat Intelligence Tools (For Tracking Cyber Criminals and Criminal Activity)

These tools are sourced from the Awesome OSINT repository and additional 2026 research, focusing on threat actor profiling, cyber threat maps, and intelligence feeds for monitoring criminal activities.

3.9 Malware Analysis & Disassembly Tools (For Analyzing and Disassembling Malware Operations)

These tools help in tracking malware locations, analyzing samples, and disassembling code to understand criminal techniques.

  • MalwareBazaar – Search and download malware samples by hash, family, tag
  • YARAify – Collaborative YARA engine for file pattern matching
  • Cuckoo Sandbox – Open-source automated malware analysis system
  • x64dbg – Open-source debugger for Windows binaries
  • Wireshark – Network protocol analyzer for malware traffic
  • Radare2 (r2) – Reverse engineering framework for static malware analysis
  • IDA Pro – Interactive disassembler for binary analysis (free version available)
  • OllyDbg – 32-bit debugger for Windows malware
  • ClamAV – Open-source antivirus for malware detection
  • Snort – Network intrusion detection for malware tracking
  • Suricata – Network threat detection engine
  • awesome-malware-analysis – Curated list of malware analysis tools

3.10 Scam Site & Phishing Analysis Tools (For Tracking and Analyzing Scam Operations)

Tools focused on identifying, scanning, and analyzing scam websites and phishing campaigns.

  • PhishStats – Phishing statistics and database
  • urlDNA – Analyze URLs, monitor brands, track phishing sites
  • Islegitsite – Checks website trustworthiness and security
  • CredenShow – Identify compromised credentials
  • HIB Ransomed – Check if data has been leaked
  • HEROIC.NOW – Dark web data leak scanner
  • IKnowYour.Dad – Data Breach Search Engine
  • StealSeek – Search and analyze data breaches
  • Venacus – Search for data breaches and notifications
  • Ahmia – Dark Web Search Engine
  • Aleph Open Search – Dark Web Search Engine
  • DataSploit – Aggregates data from multiple sources
  • Cyble ODIN – Scans internet assets, exposed buckets, vulnerabilities
  • Google Dorks – Specialized Google queries for investigations
  • NexVision – Large OSINT data pool for surface/dark web
  • Hudson Rock – Cybercrime intelligence API
  • Metagoofil – Metadata extraction from documents
  • Recon-Ng – Reconnaissance framework
  • Check Usernames – Username availability checker
  • TinEye – Reverse image search
  • Creepy – Geolocation OSINT tool
  • Videris – Full-spectrum OSINT for collection and analysis
  • i2 Analyst’s Notebook – Data visualization and analysis
  • OSINT Industries – Tools for online investigations, fraud detection
  • SL Crimewall – All-in-one OSINT for investigations
  • Recorded Future – Threat intelligence with darknet monitoring
  • Hunt.io – Tracks malicious infrastructure, C2 servers
  • BeVigil-CLI – Searches assets from mobile apps
  • Cyberbro – Searches and checks reputation of observables
  • CyberGordon – Threat intelligence search with 30+ sources
  • Discoshell – Discovery script using multiple tools
  • FOCA – Metadata and hidden info finder
  • Greynoise – Anti-Threat Intelligence for background noise
  • IntelHub – Browser-based OSINT extension
  • Orbit – Crypto wallet relationships crawler
  • OSINT-Tool – Browser extension for OSINT utilities
  • OSINT.SH – Information Gathering Toolset
  • Photon – Crawler for OSINT
  • SerpApi – Scrapes search engines
  • SerpScan – PHP script for dorking
  • Sintelix – Graphical link analysis for OSINT
  • sn0int – Semi-automatic OSINT framework
  • SpiderSuite – GUI web security crawler
  • Sub3 Suite – Intelligence gathering suite
  • Unfurl – Breaks down URLs for forensics
  • Waybackurls – Fetches URLs from Wayback Machine
  • Zen – Finds email addresses of GitHub users
  • Lampyre – All-in-one OSINT for people, businesses, crypto
  • Social Links (Crimewall) – Social media and dark web investigations

4. Attack Structure Analysis Framework

  • Delivery (email, ad, fake site)
  • Landing / Social Engineering
  • Credential Harvesting / Seed Phrase Theft
  • Proxy / C2 Layer (e.g., secureproxy.php)
  • Exfiltration (Telegram bot, Google Apps Script, blockchain)
  • Monetization (wallet drain, ransomware, etc.)
  • Infrastructure Attribution (Cloudflare, Gandi, registrar, developer OSINT)

Cross-referenced with MITRE ATT&CK:

  • TA0001 Initial Access
  • TA0006 Credential Access
  • TA0010 Exfiltration
  • TA0040 Impact

This methodology + hyperlinked tool directory is publicly shared to demonstrate transparency, professionalism, and depth of knowledge to potential employers in the OSINT / Cyber Threat Intelligence field.


Report Classification & Naming Convention

All reports in this repository follow a standardized naming structure.

1. AI-Assisted OSINT Reports

File format:

CTI-<date>-<domain-name>

Example:

CTI-23022026-grafenocliente.digital

Meaning:

  • Investigation conducted using AI-assisted automation workflow
  • Includes automated data aggregation, structured analysis, and human review
  • Follows evidence-controlled OSINT framework

2. Fully Manual OSINT Reports

File format:

CTI-<date>-<Normal-Title>

Example:

CTI-23022026-Fake-Trezor-Phishing-Campaign

Meaning:

  • Fully conducted manually
  • Deep infrastructure analysis and campaign correlation performed directly by the author
  • No automated AI structuring used for primary analysis

This distinction ensures transparency regarding methodology and investigative depth.


Key Capabilities Demonstrated

  • Digital risk detection
  • Phishing infrastructure analysis
  • Scam campaign correlation
  • OSINT-based threat intelligence reporting
  • IOC documentation and classification
  • Infrastructure pivoting and correlation
  • Pattern recognition across campaigns
  • Evidence-based analytical reasoning
  • Ethical open-source investigation discipline

Ethical Commitment

All research within AtomLab1 adheres to the following principles:

  • Only publicly accessible data is analyzed
  • No unauthorized access or intrusion is performed
  • No exploitation of vulnerabilities
  • No bypass of authentication mechanisms
  • No handling of private or leaked data

The focus is defensive intelligence and digital risk awareness.


About the Author

AtomLab1 is authored and maintained by Jake Lo, an independent Digital Risk & OSINT Researcher.

This repository represents hands-on investigative work into real-world scam infrastructure, emerging phishing campaigns, and malicious online ecosystems.

The project reflects a structured approach to intelligence production, evidence control, and analytical discipline in digital risk research.


Contact


Disclaimer

This repository is intended for educational, research, and defensive intelligence purposes only.

All findings are derived from publicly observable information at the time of investigation. No claim is made regarding legal determination of criminal activity.

Assessments reflect OSINT-based analysis and documented evidence at the time of reporting.


Stay alert. Detect early. Document clearly.

About

This repository contains detailed open-source intelligence (OSINT) investigations on phishing campaigns, scam websites, and other cyber threat actors. All reports are based on publicly observable data and aim to provide insights for security researchers, organizations, and the community.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published