THE CYBER TRIBUNAL
Subscribe
OSINT · Threat Intelligence · Investigations

THE
CYBER
TRIBUNAL

Collect·Analyze·Expose

Thoughts, stories and ideas.

Shodan Passive DNS Analysis Certificate Transparency VirusTotal Graph Dark Web Monitoring Threat Actor Tracking Malware C2 Infrastructure OSINT Investigations URLScan AlienVault OTX MalwareBazaar Collect. Analyze. Expose. Shodan Passive DNS Analysis Certificate Transparency VirusTotal Graph Dark Web Monitoring Threat Actor Tracking Malware C2 Infrastructure OSINT Investigations URLScan AlienVault OTX MalwareBazaar Collect. Analyze. Expose.

Recent Case Files

View All →
Method
01

Collect

Systematic gathering from open sources — passive DNS, certificate logs, threat feeds, dark web monitoring, and infrastructure scanning.

02

Analyze

Pivoting on indicators, building actor profiles, correlating TTPs against MITRE ATT&CK, and separating signal from noise.

03

Expose

Publishing findings with transparent methodology so defenders can act on intelligence and researchers can verify the work.