scope-recon is a Rust binary that queries 12 threat intelligence sources in parallel and renders verdicts in a terminal UI, with optional LLM-synthesized threat assessments.
A detailed technical walkthrough of scope-recon, a Rust tool that aggregates IP threat intelligence from 11 concurrent API sources, including its async architecture, TUI design, verdict logic, cache system, and API key security practices.
A structured implementation guide for building a VPS with no publicly reachable inbound ports, using kernel hardening, localhost service binding, and Cloudflare Tunnel as the sole ingress path.
A comprehensive reference covering the OPSEC process, cryptographic controls, physical security, secure communications architecture, and a forensic breakdown of OPSEC failures in the BreachForums case.
A structured reference covering the Lockheed Martin Cyber Kill Chain, the Diamond Model of Intrusion Analysis, and MITRE ATT&CK, illustrated with real-world case studies and adversary examples.
A setup guide for deploying a bare-metal Fedora KVM hypervisor on the Minisforum MS-A2 mini PC, covering hardware selection, Btrfs storage pool configuration, SELinux policy, and libvirt integration as the foundation for a CTI and malware analysis lab.
A detailed deployment guide for integrating MISP and OpenCTI into a high-performance, solo CTI lab on Fedora 43, covering architecture, system tuning, ingestion pipelines, and operational troubleshooting.
A structured reference covering the core intelligence collection disciplines—HUMINT, SIGINT, IMINT, MASINT, and OSINT—their adaptation to the cyber domain as CYBINT, and the legal and ethical frameworks governing their use.
A structured reference covering the core components, four intelligence categories, and the distinction between reactive and proactive cyber defense within a CTI framework.
A structured analysis of the 2024 cyber threat landscape covering regional attack volume trends, sector-specific vulnerabilities, and four primary attack vectors with associated CTI roles.