Investigator Use
Use Ransomware finder when working in the Cyber Threat OSINT phase of an investigation. Open it after recording the target, source URL, time, and reason for use in your case notes.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
CVE
Cyber Threat OSINT
CVE provides standardized vulnerability identifiers and references used in security research, triage, and threat intelligence workflows. This resource supports threat intelligence, vulnerability research, and IOC investigation.
CVE Details
Cyber Threat OSINT
CVE Details aggregates vulnerability records, scoring data, and affected products for faster security analysis and prioritization. This resource supports threat intelligence, vulnerability research, and IOC investigation.
Default Passwords
Cyber Threat OSINT
Default Passwords provides capabilities for public record research, legal intelligence, and due diligence. Find over 6286 default passwords, default usernames, default logins, and access methods here! Secure your routers,.
Exploit DB
Cyber Threat OSINT
Exploit DB provides capabilities for threat intelligence, vulnerability research, and IOC investigation. The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports,.
Honey DB
Cyber Threat OSINT
Honey DB is an OSINT resource for vulnerability and threat intelligence analysis. It supports threat intelligence, vulnerability research, and IOC investigations.
Hybrid analysis
Cyber Threat OSINT
Hybrid analysis is an OSINT resource for vulnerability and threat intelligence analysis. It supports threat intelligence, vulnerability research, and IOC investigations.