index
Indice global — Vault CTI Juniors
v3.3 — vault completo y wikilink-clean tras procesamiento Inbox + creación entities + import CERTSG-IRM + dewikilinking final.
322 notas en 12 disciplinas IC + Templates + Prompts. 0 wikilinks rotos.
Empieza aqui
- cti-recursos-juniors-unificado (doctrina/) — manual madre L1 (lectura linear A->K).
- osint-references-master (osint-references/) — indice unificado awesome-osint + OSINT Bible.
- manual-paranoid-opsec (opsec/) — indice OPSEC con sub-notas operativas.
- entidad-admiralty-system, entidad-wep, entidad-tlp-v2, ciclo-de-inteligencia — doctrina canonica.
📚 doctrina/ (42 notas)
Masters / manuales:
- cti-recursos-juniors-unificado — Manual de recursos CTI / CTH para juniors — Juniors + Fer + vault
Entities (19):
- ciclo-de-inteligencia — Ciclo de Inteligencia
- entidad-ach — Analysis of Competing Hypotheses (ACH)
- entidad-admiralty-system — Admiralty System (NATO 6×6)
- entidad-devils-advocacy — Devil's Advocacy
- entidad-icd-203 — ICD-203 (Intelligence Community Directive 203)
- entidad-indicators-signposts — Indicators / Signposts of Change
- entidad-key-assumptions-check — Key Assumptions Check
- entidad-mom-pop-moses-eve — Mom-Pop-Moses-Eve (Heuristica de Hipotesis)
- entidad-multiple-hypothesis-generation — Multiple Hypothesis Generation
- entidad-odni — ODNI (Office of the Director of National Intelligence)
- entidad-phia-yardstick — PHIA Probability Yardstick (UK)
- entidad-psychology-intelligence-analysis — Psychology of Intelligence Analysis (Heuer 1999)
- entidad-quality-of-information-check — Quality of Information Check
- entidad-randolph-pherson — Randolph Pherson
- entidad-richards-heuer — Richards J. Heuer Jr. (1927-2018)
- entidad-robert-clark — Robert M. Clark
- entidad-sherman-kent — Sherman Kent (1903-1986)
- entidad-tlp-v2 — Traffic Light Protocol v2.0 (TLP)
- entidad-wep — Words of Estimative Probability (WEP)
Notas (22):
- ceh-00-start-here — 00 Certified Ethical Hacker - Start Here
- ceh-01-introduction — 01 Introduction to Ethical Hacking
- ceh-02-footprinting-recon — 2 Huellas Digitales y Reconocimiento
- cti-osint-cheatsheet
- doctrina-minima-viable — Doctrina minima viable — Admiralty, WEP, TLP, ACH, ICD-203
- ec-council-ctia-cert — EC Council CTIA
- formula-combinatoria-convergencia-osint — Formula combinatoria para convergencia de identidades OSINT
- fuentes-a1-vendors-gold-standard — Fuentes A1 — vendors gold standard CTI/OSINT
- fundamentos-osint — 1. Fundamentals
- glosario-cti-cth — Glosario CTI / CTH — terminologia esencial
- guia-escritura-inteligencia — Guia de escritura de inteligencia - proposito, retencion y estructura
- legal-considerations-osint — 11. Legal Considerations
- metodologia-4-pasos-osint — 2. 4-Step Methodology
- osint-analysis-intelligence-report-writing
- osint-learning-resources — 30. Learning Resources
- osint-mastery-learning — OSINT Mastery — Quick Start + Documentation/Learning + Future Development
- otan-uint-operational-playbook — Operational Playbook – Unidad de Inteligencia (UINT) – OTAN
- otan-uint-plan-accion-operativo — Plan de Acción Operativo para Organizar el Trabajo de la Unidad de Intelige
- professional-methodologies — 28. Professional Methodologies
- programa-academico-analista-inteligencia — Programa Académico - Analista Inteligencia
- roadmap-90-dias-junior — Roadmap 90 dias para junior CTI/CTH
- sesgos-cognitivos-analista — Sesgos cognitivos del analista de inteligencia
🌐 osint-references/ (9 notas)
Masters / manuales:
- osint-mastery-guide — OSINT Mastery Guide — Master Index (Jamba Academy)
- osint-references-master — OSINT References Master — Indice unificado (awesome-osint + osint-bible)
Notas (7):
- gaming-platforms
- music-streaming-services
- osint-blogs
- osint-videos
- osint360-gpt — OSINT360 — Cyber Intelligence GPT
- other-osint-resources — Other Resources
- related-awesome-lists
🔧 osint-tools/ (37 notas)
Notas (37):
- academic-resources — Academic Resources and Grey Literature
- ai-intelligence-osint — 13. AI Intelligence
- ai-search-engines — AI Search Engines — listado para OSINT
- all-in-one-frameworks — 26. All-in-One Frameworks
- automation-python-osint — 9. Automation (Python)
- chatgpt-jailbreak-tier5 — Turn Every ChatGPT-4o Chat Into A Persistent Tier 5 (Universal) Jailbreak B
- code-search
- dark-web-search-engines
- data-statistics — Data and Statistics
- deep-dark-web-bible — 8. Deep & Dark Web
- document-slides-search — Document and Slides Search
- extra-osint-resources — 12. Extra Resources
- fact-checking
- file-search
- general-search-engines — General Search
- google-dorks-tools
- infographics-visualization — Infographics and Data Visualization
- internet-search-bible — 4. Internet Search
- keywords-discovery — Keywords Discovery and Research
- lampyre-tool — Lampyre. La Herramienta OSINT que Revoluciona las Investigaciones Digitales
- language-tools
- maltego-advanced — 27. Advanced Maltego
- meta-search-engines — Meta Search
- national-search-engines — Main National Search Engines
- news-digest-discovery — News Digest and Discovery Tools
- news-osint — News
- osint-mastery-tools — OSINT Mastery — Tool Categories + AI-Powered + Stats
- osint-tools-tabla — OSINT Tools — Tabla maestra
- other-osint-tools — Other Tools
- privategpt-local-llm — Installing PrivateGPT on WSL with GPU support
- querytool-google-sheet — QueryTool — Google Sheet OSINT framework
- similar-sites-search
- speciality-search-engines
- spiderfoot-correlations
- tools-mind-map — 3. Tools Mind Map
- web-monitoring
- web-niveles-deep-dark — Las diferencias entre los niveles de la web y su acceso a la información.
🎯 cti/ (90 notas)
Entities (20):
- campaign-solarwinds-2020 — Campaign SolarWinds / SUNBURST / NOBELIUM (2020)
- entidad-bushidouk-rfi-template — BushidoUK RFI Template
- entidad-curated-intelligence-threat-actor-profile — Curated Intelligence Threat Actor Profile Template
- entidad-cyber-kill-chain — Lockheed Martin Cyber Kill Chain (CKC)
- entidad-diamond-model — Diamond Model of Intrusion Analysis
- entidad-first-org — FIRST.org (Forum of Incident Response and Security Teams)
- entidad-idir-templates — IDIR Intelligence Reports Templates
- entidad-kraven-security-cti-template — Kraven Security CTI Templates
- entidad-misp — MISP (Malware Information Sharing Platform)
- entidad-mitre-attack-navigator — MITRE ATT&CK Navigator
- entidad-mitre-attack — MITRE ATT&CK Framework
- entidad-mitre-corporation — MITRE Corporation
- entidad-mitre-cti-blueprints — MITRE CTI Blueprints
- entidad-opencti — OpenCTI
- entidad-stix-taxii — STIX 2.1 + TAXII 2.1
- entidad-thehive — TheHive
- entidad-unified-kill-chain — Unified Kill Chain (UKC)
- entidad-zeltser-cti-template — Lenny Zeltser CTI Report Template
- threat-actor-apt28 — APT28 (Fancy Bear / Sofacy / Pawn Storm / Strontium)
- threat-actor-sandworm — Sandworm Team (Voodoo Bear / GRU Unit 74455)
Notas (70):
- 10-steps-comprehensive-cti-practice — 10 Steps to Building a Comprehensive CTI Practice
- adversary-emulation-red-team — Emulación de Adversarios y Operaciones Red Team
- analisis-inteligencia-competitiva-cyber360 — Analisis de Inteligencia Competitiva - Programa CTI Cyber360
- analyzing-ti-feeds-overlap-novelty — Analyzing TI feeds for overlap, novelty and aging
- breach-intelligence-darknet-monitoring — Inteligencia de Brechas y Monitorización Darknet
- caso-elecciones-francesas-2017-desinformacion — Del hack al hashtag. Interferencia y desinformación en las presidenciales f
- caso-marks-spencer-scattered-spider — Analisis del ataque de ingenieria social a Marks & Spencer - Scattered Spid
- ceh-07-malware-threats — 7 Malware Threats
- certsg-irm-01-worm-infection — CERT-SG IRM-01: Worm Infection
- certsg-irm-02-windows-intrusion — CERT-SG IRM-02: Windows Intrusion
- certsg-irm-03-unix-linux-intrusion — CERT-SG IRM-03: Unix Linux Intrusion
- certsg-irm-04-ddos — CERT-SG IRM-04: Ddos
- certsg-irm-05-malicious-network-behaviour — CERT-SG IRM-05: Malicious Network Behaviour
- certsg-irm-06-website-defacement — CERT-SG IRM-06: Website Defacement
- certsg-irm-07-windows-malware — CERT-SG IRM-07: Windows Malware
- certsg-irm-08-blackmail — CERT-SG IRM-08: Blackmail
- certsg-irm-09-smartphone-malware — CERT-SG IRM-09: Smartphone Malware
- certsg-irm-10-social-engineering — CERT-SG IRM-10: Social Engineering
- certsg-irm-11-information-leakage — CERT-SG IRM-11: Information Leakage
- certsg-irm-12-insider-abuse — CERT-SG IRM-12: Insider Abuse
- certsg-irm-13-customer-phishing — CERT-SG IRM-13: Customer Phishing
- certsg-irm-14-scam — CERT-SG IRM-14: Scam
- certsg-irm-15-trademark-infringement — CERT-SG IRM-15: Trademark Infringement
- certsg-irm-16-phishing — CERT-SG IRM-16: Phishing
- certsg-irm-17-ransomware — CERT-SG IRM-17: Ransomware
- certsg-irm-18-large-scale-compromise — CERT-SG IRM-18: Large Scale Compromise
- ciberguerra-ia-infraestructuras-criticas — El Nuevo Paradigma de la Ciberguerra - Convergencia Geopolítica y Aceleraci
- combining-frameworks-incident-reporting — Combining Cybersecurity Frameworks - An Alternative to Incident Reporting
- cti-automation-timely-protection — Embracing Automation in Cyber Threat Intelligence, The Key to Timely Protec
- cti-basics-for-beginners — Basic & Musts - Cyber Threat Intelligence for Beginners
- cti-offensive-security-github-tools — CTI - Offensive Security GitHub Tools
- cti-reconciliation — CTI Reconciliaton
- cti-theory-vs-experience — Theory VS Experience - A CTI Approach
- cti-toolkit-overview — Cyber Intelligence Toolkit — overview
- cyber-security-playbooks
- cybersecurity-journey-soc-analyst — The Cybersecurity Journey - Pathways to Becoming a Top-Tier SOC Analyst
- data-breach-search-engines
- data-feeds-vs-intelligence — Threat Data Feeds and Threat Intelligence Are Not the Same Thing
- detection-mitigation-common-attacks — Detection and Mitigation of Common Attacks
- ems-stride-mitre-attack — EMS con STRIDE y MITRE ATT&CK
- inteligencia-deteccion-ttps-hunting-playbooks — De la Inteligencia a la Detección — TTPs, Threat Hunting y Playbooks
- live-cyber-threat-maps
- metodologia-scoring-riesgo-vip-cvss — Metodologia de scoring de riesgo digital VIP - modelo tipo CVSS
- mxdr-integration-roadmap — Strategy Roadmap for MXDR Integration (V2)
- pastebins
- proactive-cti-collaboration — Strengthening Proactive CTI Through Collaboration
- proceso-replicar-investigacion-actores — Proceso Combinado para Replicar una Investigación sobre Actores de Amenazas
- programa-cti-diseno-integracion-madurez — Programa CTI — Diseño, Integración y Madurez Operativa
- recorded-future-ai-evolution — The Next Evolution of Recorded Future AI - Powering the Future of Threat In
- recorded-future-cti-guide — What is Threat Intelligence - A RF Guide
- red-team-vs-blue-team
- report-templates-bible — 10. Report Templates
- reporte-ejemplo-cti-1 — CTI Report 1 (ejemplo)
- reporte-ejemplo-cti-2 — CTI Report 2 (ejemplo)
- resumen-semanal-ciberseguridad — Resumen Semanal de Ciberseguridad - Noticias, Tecnicas y Herramientas
- threat-actor-search
- threat-intelligence-feeds — Threat Intelligence
- threat-modeling-llm-banking — ThreatModeling-LLM, Automating Threat Modeling using Large Language Models
- use-case-00-keywords-repository — Use Case 0 - Keywords Repository
- use-case-01-intelligence-platform-alerts — Use Case 1 - Intelligence Platform Alerts
- use-case-02-cti-feeds — Use case 2 - Cyber Threat Intelligence Feeds
- use-case-03-vulnerability-intelligence — Use case 3 - Vulnerability Intelligence
- use-case-04-infostealer-monitoring — Use case 4 - Infostealer monitoring
- use-case-05-daily-cti-report — Use Case 5 - Daily CTI Report
- use-case-06-phishing-intelligence — Use Case 6 - Phishing Intelligence
- use-case-07-threat-hunting — Use Case 7 - Threat Hunting
- use-case-08-strategic-intel-report — Use Case 8 - Strategic Intelligence Report
- use-case-09-mitre-ecommerce-retail — Use Case 9 - Most Common Mitre ATT&CK Methods - eCommerce-Retail
- use-case-10-threat-intel-sharing — Use Case 10 - Threat Intelligence Sharing
- what-is-threat-intelligence
💬 socmint/ (9 notas)
Notas (9):
- blog-search
- forums-discussion-boards — Forums and Discussion Boards Search
- major-social-networks
- real-time-social-search — Real-Time Search, Social Media Search, and General Social Media Tools
- reporte-ejemplo-communication-patterns-1 — Communication Patterns Analysis Report 1 (ejemplo)
- reporte-ejemplo-communication-patterns-2 — Communication Patterns Analysis Report 2 (ejemplo)
- social-media-tools
- social-network-analysis
- username-enumeration — Username Check
👤 persint/ (10 notas)
Notas (10):
- company-research
- email-investigation — Email Search / Email Check
- expert-search
- job-search-resources
- people-investigations
- phone-research — Phone Number Research
- qa-sites — Q&A Sites
- reporte-ejemplo-company-investigation — Company Investigation Report (ejemplo)
- reporte-ejemplo-individual-investigation — Individual Investigation Report (ejemplo)
- vehicle-research — Vehicle / Automobile Research
🖥️ techint/ (63 notas)
Notas (63):
- aircrack-ng
- analisis-codigo-dinamico-estatico — Análisis de Código Dinámico o Estático
- analisis-ejecutables-binarios — Análisis de Ejecutables Binarios
- android-osint-mobile — ANDROID
- application-security-software-lifecycle — Application Security in the Software Lifecycle - Study Guide
- bgp-seekers
- bloodhound-active-directory-queries — Consultas Personalizadas en BloodHound para Active Directory
- browsers-osint — Browsers
- categorias-componentes-vulnerabilidades-escaneo — Categorías Especiales de Componentes o Vulnerabilidades Escaneo
- ceh-03-network-scanning — 3 Escaneo de Redes
- ceh-04-enumeration — 04 Enumeracion
- ceh-05-vulnerability-analysis — 5 Análisis de Vulnerabilidades
- ceh-06-system-hacking-privesc — 06 Hacking de Sistemas, Escalada de Privilegios y Persistencia
- ceh-08-sniffing — 08 Sniffing
- ceh-10-denial-of-service — 10 Denegación de Servicio
- ceh-11-session-hijacking — 11 Session Hijacking
- ceh-13-hacking-web-servers — 13 Hacking Web Servers
- ceh-14-hacking-web-apps — 14 Hacking Web Applications
- ceh-15-sql-injections — 15 SQL Injections
- ceh-16-wireless-networks — 16 Wireless Networks
- ceh-17-mobile-hacking — 17 Hacking Mobile Platforms
- ceh-18-iot-hacking — 18 IoT Hacking
- ceh-19-cloud-computing — 19 Cloud Computing
- ceh-20-cryptography — 20 Cryptography
- deteccion-xss-multiples-tipos — Detección de múltiples tipos de Cross-site scripting
- dns-tools — DNS
- docker-analysis
- domain-ip-research — Domain and IP Research
- estudio-enumeracion-vulnerabilidades-auth — Estudio - Enumeracion y Vulnerabilidades de Autenticacion
- evaluacion-vulnerabilidades-middleware — Evaluación de vulnerabilidades para Middleware
- fuerza-bruta-autorizacion-iot — Fuerza Bruta de Autorización o Escaneo de Vulnerabilidades para IoT
- ics-01-osint — 01-osint
- ics-02-setup-lab — 02-setup_ics_lab
- ics-03-pentest-platform — 03-pentest_platform_overview
- ics-04-practical-1 — 04-practical_1
- ics-05-practical-2 — 05-practical_2
- ics-06-real-hardware — 06-real_hardware
- ics-07-gas-station-controller — 07-gas_station_controller
- ics-08-modbus-plc-sim — 08-modbus_plc_sim
- ics-09-pentesting-modicon — 09-pentesting_real_modicon_hardware
- ics-10-pentesting-substation — 10-pentesting_an_infrastructure_substation
- ics-pentest-course-overview — ICS Pentest Course Notes_DNU
- ics-plan-pruebas-cliente — Plan de pruebas de pentesting ICS - requerimientos y cuestionario cliente
- ics-scada-superficie-ataque — Seguridad ICS-SCADA — Superficie de Ataque en Infraestructuras Críticas
- itca-windows-linux-firewalls — ITCA - Windows and Linux OS Firewalls
- llm-pentesting
- metadata-extraction — 23. Metadata Extraction
- network-scanning — 24. Network Scanning
- network-security-study-guide
- offline-browsing
- pentest-inalambrico — Pentest Inalámbrico
- red-team-siemens-spectrum-power — Red Team Security Analysis and Threat Modeling – Siemens Spectrum Power
- reporte-ejemplo-domain-website — Domain and Website Analysis Report (ejemplo)
- reporte-ejemplo-network-recon — Network Reconnaissance Report (ejemplo)
- scada-acronimos-comunicaciones — SCADA - acronimos y comunicaciones industriales
- scada-analisis-debilidades — SCADA - analisis de debilidades
- scada-siemens-spectrum-power — SCADA - Siemens Spectrum Power
- scanning-ports-ssh — Scanning Ports and Utilizing SSH
- smart-contract-pentesting
- transport-osint — 18. Transport OSINT
- web-history-capture — Web History and Website Capture
- web-scraping — 22. Web Scraping
- wifi-wardriving — 19. WiFi/Wardriving
🛰️ geoint/ (9 notas)
Notas (9):
- facial-recognition — 14. Facial Recognition
- geospatial-mapping — Geospatial Research and Mapping Tools
- image-analysis
- image-search
- maritime-osint — Maritime
- reporte-ejemplo-geoint-1 — GEOINT Report 1 (ejemplo)
- reporte-ejemplo-geoint-2 — GEOINT Report 2 (ejemplo)
- video-tools — Video Search and Other Video Tools
- visual-search-clustering — Visual Search and Clustering Search Engines
💰 finint/ (3 notas)
Notas (3):
- blockchain-crypto-investigation — 17. Blockchain/Crypto
- reporte-ejemplo-blockchain-1 — Blockchain Investigation Report 1 (ejemplo)
- reporte-ejemplo-blockchain-2 — Blockchain Investigation Report 2 (ejemplo)
🛡️ opsec/ (28 notas)
Masters / manuales:
- manual-paranoid-opsec — Paranoid OPSEC — Manual maestro (indice)
Notas (27):
- ceh-09-social-engineering — 09 Ingeniería Social
- ceh-12-evading-ids-firewall — 12 Evading IDS, Firewall and Honeypots
- cisa-red-team-assessment-critical-infra — Insights from CISA Red Team Assessment of a US Critical Infrastructure Sect
- guia-opsec-carrefour — Guia OPSEC y buenas practicas de seguridad operativa - Carrefour
- ingenieria-social-compromiso-credenciales — Ingeniería Social y Compromiso de Credenciales
- opsec-advanced-topics — OPSEC — Advanced topics
- opsec-browser-fingerprinting — OPSEC — Browser, fingerprinting & content OPSEC
- opsec-checklists — OPSEC — Checklists operativas
- opsec-comsec — OPSEC — COMSEC (Communications Security)
- opsec-data-handling-chain-of-custody — OPSEC — Data handling, evidence & chain of custody
- opsec-device-endpoint-security — OPSEC — Seguridad de dispositivos y endpoints
- opsec-fundamentos — OPSEC — Fundamentos (Overview, Scope, Threat Modeling, Principles)
- opsec-identity-compartmentalization — OPSEC — Identidad y compartimentacion de personas (sock puppets)
- opsec-monitoring-audits — OPSEC — Monitoring, audits & incident response
- opsec-network-transport-security — OPSEC — Network & transport security
- opsec-social-behavioral — OPSEC — Social & behavioral OPSEC
- opsec-source-protection-humint — OPSEC — Source protection & HUMINT interactions
- opsec-templates-automation — OPSEC — Templates & automation snippets
- opsec-tools-utilities — OPSEC — Tools & utilities reference
- opsec-travel-physical-security — OPSEC — Travel & physical security
- plan-ejercicio-vishing — PLAN DE EJERCICIO DE VISHING
- privacy-encryption-tools — Privacy and Encryption Tools
- privacy-search-engines — Privacy Focused Search Engines
- rayhunter-cellular-spying-detection — Meet Rayhunter A New Open Source Tool from EFF to Detect Cellular Spying
- sistema-anonimizacion-texto — Sistema de Anonimización de Texto - Solución Completa
- vpn-services
- waffled-bypass-castellano — WAFFLED TL;DR (castellano)
🤖 ai-forensics/ (3 notas)
Notas (3):
- checklist-ai-detection — AI Detection — checklist operativa
- content-verification — 20. Content Verification
- manual-ai-media-forensics — AI Media Forensics — manual
⚖️ compliance/ (2 notas)
Notas (2):
- reporte-ejemplo-compliance-2 — Compliance Analysis Report 2 (ejemplo)
- reporte-ejemplo-compliance-doc-1 — Compliance Documentation Report 1 (ejemplo)
🔗 Themes (25 themes — sintesis cruzada)
- tema-cti-fundamentos-doctrina (54 notas) — CTI Fundamentos y Doctrina — entities canonicas del IC
- tema-osint-toolchain-comparativa (37 notas) — OSINT Toolchain — todas las atomicas operativas
- tema-report-writing-cti (34 notas) — Report Writing CTI — plantillas, ejemplos y guias
- tema-opsec-completo-analista (28 notas) — OPSEC del analista — manual completo
- tema-curso-ceh-completo (21 notas) — Curso CEH — Certified Ethical Hacker (21 capitulos)
- tema-curso-ics-pentesting (19 notas) — Curso ICS Pentesting + SCADA — infraestructura industrial
- tema-incident-response-irm (18 notas) — CERT-SG IRM — 18 Incident Response Methodologies
- tema-techint-domain-network (12 notas) — TECHINT Domain & Network — recon completo de infraestructura
- tema-cti-use-cases-marco (11 notas) — CTI Use Cases — los 11 casos operativos del programa
- tema-persint-corpint-completo (10 notas) — PERSINT + CORPINT — investigacion de personas y empresas
- tema-geoint-completo (9 notas) — GEOINT + IMINT — Geospatial e imagery intelligence
- tema-socmint-completo (9 notas) — SOCMINT — Social Media Intelligence completa
- tema-sat-tecnicas-analisis-estructurado (8 notas) — SAT — Tecnicas de Analisis Estructurado (Heuer + Pherson)
- tema-templates-comparativa (6 notas) — Templates CTI — comparativa de 6 estandares
- tema-figuras-doctrinales-ic (5 notas) — Figuras doctrinales del Intelligence Community
- tema-osint-references-master-deep-dive (5 notas) — OSINT References Master — los 3 catalogos catch-all
- tema-mitre-attack-ecosistema (4 notas) — MITRE ATT&CK Ecosystem
- tema-ransomware-actores-y-respuesta (4 notas) — Ransomware — actores, IR y casos
- tema-tips-sirp-stack-open-source (4 notas) — TIP + SIRP open source stack — MISP + OpenCTI + TheHive + STIX/TAXII
- tema-blockchain-finint (3 notas) — Blockchain & FININT — investigacion de cripto e infraestructura financiera
- tema-darkweb-osint (3 notas) — Dark Web OSINT — investigacion en .onion y deep web
- tema-deepfakes-ai-forensics (3 notas) — Deepfakes & AI Forensics — verificacion de medios sinteticos
- tema-kill-chains-comparativa (3 notas) — Kill Chains — CKC vs UKC vs Diamond Model
- tema-malware-cadena-completa (3 notas) — Malware — desde la educacion hasta la respuesta
- tema-phishing-completo (3 notas) — Phishing — vista completa (CTI + IR)
📋 Templates/reportes-osint/ (16)
- plantilla-asset-investigation — Asset Investigation Report — plantilla
- plantilla-breach-analysis — Breach Analysis Report — plantilla
- plantilla-communication-patterns — Communication Patterns Analysis Report — plantilla
- plantilla-de-informe-de-pentesting-web-xss-y-sql-injection — Plantilla de informe de pentesting web - XSS y SQL Injection
- plantilla-domain-website — Domain & Website Analysis Report — plantilla
- plantilla-domains-and-ip-addresses-investigation-template — Domains and IP Addresses Investigation Template
- plantilla-individual-investigation — Individual Investigation Report — plantilla
- plantilla-informe-cti-osint-data-leak — Plantilla Informe CTI - OSINT DATA LEAK
- plantilla-informe-técnico-para-el-equipo-del-soc-tecnico-amenaza-de — Informe Técnico para el Equipo del SOC (Tecnico) - Amenaza de Hacktivismo p
- plantilla-modelo-de-reporting-amenaza-de-hacktivismo-contra-agencia — Modelo de Reporting - Amenaza de Hacktivismo contra Agencia
- plantilla-network-recon — Network Reconnaissance Report — plantilla
- plantilla-personal-information-target-file — PERSONAL INFORMATION Target File
- plantilla-plantillas-de-prompts-para-reportes-cti-vulnerabilidades-y-n — Plantillas de prompts para reportes CTI, vulnerabilidades y newsletters
- plantilla-resumen-de-inteligencia-amenazas-al-sector-retail-y-ecomme — Resumen de Inteligencia - Amenazas al Sector Retail y ECommerce-Plantilla
- plantilla-target-file — Target File
- plantilla-threat-intelligence — Threat Intelligence Report — plantilla
💡 Prompts/ (1)
Stats v3.3
- Total notas: 322
- Wikilinks rotos: 0
- Entities doctrinales: 39 (con definicion canonica IC)
- Templates reusables: 16
- Disciplinas IC pobladas: 12