tracking-threat-actor-infrastructure
mukul975/Anthropic-Cybersecurity-Skills
Tracking Threat Actor Infrastructure uses Shodan, Censys, passive DNS, CT logs, WHOIS, and network fingerprinting to discover, map, and pivot across adversary-controlled servers and domains, letting analysts detect new C2 nodes and phishing sites earlier.