threatintel
actor tracker
analyst tool · entity extraction

Paste OSINT, pull structured entities.

Drop in a vendor blog snippet, a Reddit thread, an unstructured advisory — anything with adversary text. The extractor pulls CVE identifiers, MITRE ATT&CK technique IDs, SHA-256 / SHA-1 / MD5 hashes, IPv4 addresses, and domains (refanged automatically), plus actor mentions that match this site's alias catalog. Any extracted IOC that's already in the catalog comes back with the owning actor and citation inline.

Deterministic: pure regex + alias substring match, no LLM call. Same input always produces the same output.

0 / 20,000 chars