tracking-threat-actor-infrastructure
mukul975/Anthropic-Cybersecurity-Skills
Monitors and maps threat actor assets by combining Shodan/Censys scans, passive DNS, certificate transparency, WHOIS lookups, and fingerprinting to track command-and-control servers, phishing sites, and pivots over time for security teams.