OSINT · Threat Intelligence · Investigations
THE
CYBER
TRIBUNAL
Collect·Analyze·Expose
Thoughts, stories and ideas.
Shodan
Passive DNS Analysis
Certificate Transparency
VirusTotal Graph
Dark Web Monitoring
Threat Actor Tracking
Malware C2 Infrastructure
OSINT Investigations
URLScan
AlienVault OTX
MalwareBazaar
Collect. Analyze. Expose.
Shodan
Passive DNS Analysis
Certificate Transparency
VirusTotal Graph
Dark Web Monitoring
Threat Actor Tracking
Malware C2 Infrastructure
OSINT Investigations
URLScan
AlienVault OTX
MalwareBazaar
Collect. Analyze. Expose.
Recent Case Files
View All →Method
01
Collect
Systematic gathering from open sources — passive DNS, certificate logs, threat feeds, dark web monitoring, and infrastructure scanning.
02
Analyze
Pivoting on indicators, building actor profiles, correlating TTPs against MITRE ATT&CK, and separating signal from noise.
03
Expose
Publishing findings with transparent methodology so defenders can act on intelligence and researchers can verify the work.
Intel Delivered.
New case files, tool breakdowns, and threat intelligence drops — straight to your inbox. No noise. No marketing. Just the work.