Claude Code Tools

cti-expert

github

CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.

Stars
⭐ 103
License
NOASSERTION
Last Updated
2026-05-17
Source
github

CTI Expert

Cyber Threat Intelligence & OSINT Analysis Toolkit

Transform Claude into a trained intelligence analyst — 67+ commands, 38 techniques, zero API keys required for core functionality.


View Demo  |  Quick Start  |  Commands  |  Contribute


Version 2.3  License: MIT  67+ Commands  38 Techniques  No API Keys for Core

Stars  Forks  Downloads  Issues  Pull Requests  Last Commit  Repo Size  Contributors

English  Tiếng Việt  中文


Built by Hieu Ngohieu.ngo@chongluadao.vnchongluadao.vn




What is CTI Expert?

A Claude Code skill that transforms Claude into a trained cyber threat intelligence and open-source intelligence analyst. It runs structured intelligence collection using 67+ commands across 35 techniques — no API keys required for core functionality. Some techniques offer optional enhanced access via free API keys (e.g., Wigle, VirusTotal, URLScan.io).

Core Capability

Multi-vector reconnaissance on any target type — person, domain, organization, username, email, IP, WiFi — with automated finding validation, exposure scoring, and structured intelligence delivery.

AEAD Workflow

Acquire raw data → Enrich with pivot expansion → Assess findings → Deliver structured reports (Markdown + Word with charts, diagrams, styled formatting).




Demo

Full Case Investigation

Full Case Demo — /case command running a complete investigation

CTI Report Generation

CTI Report Demo — Markdown + DOCX report output

Screenshots

INTSUM ReportNetwork TopologyRisk Assessment
INTSUM ReportNetwork Topology DiagramRisk Assessment Score



What’s New in v2.3

CategoryWhat’s NewDetails
WHOISUniversal WHOIS for all TLDswhoisdomain + CLI + Whoxy API; .vn, .th, .sg, .kr, 27+ ccTLD servers
WHOISReverse & historical WHOIS (free)Whoxy reverse API, historical lookup, ViewDNS
Web CollectionScrapling adaptive scraping3-tier: static → anti-bot → JS rendering; headless auto-open
Web CollectionHeadless browser auto-open defaultJS-heavy sites auto-detected and rendered via DynamicFetcher
OrchestrationAgentFlow parallel enrichmentDAG-based parallel pivot expansion for 3+ subjects
PerformanceHTML parsing ~2msScrapling parser replaces slow HTTP scraping
PlatformPython 3.10+ minimumRequired by Scrapling and AgentFlow
What's New in v2.2

What’s New in v2.2

CategoryWhat’s NewDetails
Image ForensicsFace search, reverse image, manipulation detection, AI geolocationFaceCheck.id, TinEye, FotoForensics, Forensically, picarta.ai, GeoSpy, Pic2Map
BlockchainCrypto wallet tracing, transaction graphs, scam detectionBlockchair, Etherscan, WalletExplorer, OXT.me, Chainabuse, Breadcrumbs
TransportAircraft tracking (unfiltered), vessel AIS, vehicle VIN lookupADS-B Exchange, Flightradar24, Marine Traffic, VesselFinder, NICB VINCheck
DarknetTor search, ransomware monitoring, onion service discoveryAhmia.fi, onionsearch, DarknetLive, ransomwatch
Social MediaReddit, Instagram, TikTok, Telegram investigationOsintgram, instaloader, toutatis, RedditMetis, TGStat, TelegramDB, Bellingcat TikTok Timestamp
People SearchUS people search engines, free reverse lookupsTruePeopleSearch, FastPeopleSearch, IDCrawl, That’s Them
Mega-Dorks11 cross-platform Google dork templates covering 73 unique domainsSocial, Telegram ecosystem, dev platforms, forums, paste sites, darknet, breach DBs, business, image, messaging, jobs
IoTWebcam directories, IoT device searchInsecam, Thingful
What's New in v2.1
CategoryNew CommandsWhat It Does
Intelligence/cti-expert /render threat-path, /cti-expert /render attack-surfaceAttack path flow + infrastructure exposure visualization
Intelligence/cti-expert /snapshots, /cti-expert /diffWayback Machine snapshots and version diffing
Intelligence/cti-expert /drift, /cti-expert /report iocTemporal risk tracking + IOC export (STIX 2.1)
UX/cti-expert /onboard, /cti-expert /clarify, /cti-expert /qualityFirst-time tutorial, finding explanation, quality scoring
UX/cti-expert /blind-spots, /cti-expert /source-checkGap analysis + batch URL verification
UX/cti-expert /workspace diffCompare two saved investigation sessions
Data ModelSource Reliability A-FComplements trust scores with source-level grading
Data Model4 new entity typesDevice, Image, Crypto Address, Custom
Data ModelHIGH conflict severity4-level severity: CRITICAL/HIGH/NOTABLE/MINOR



Installation

Recommended: Use Claude Code CLI — it gives you the full terminal workflow, persistent sessions, and direct skill invocation. Download here or run npm install -g @anthropic-ai/claude-code.

Why Claude Code CLI?

The entire CTI Expert workflow is optimized for Claude Code CLI. The CLI gives you:

  • Persistent sessions — investigations survive terminal restarts via /cti-expert /workspace save
  • Full tool access — file writes, Python scripts, DOCX generation, all run natively
  • Skill invocation — type /cti-expert directly in the terminal, no browser required
  • Background agents — parallel enrichment via AgentFlow works best with the CLI

Step 1 — Install Claude Code CLI

npm install -g @anthropic-ai/claude-code

Requires Node.js 18+. Full docs: docs.anthropic.com/en/docs/claude-code/overview


Step 2 — Clone + All-in-One Installer

The scripts/install.sh installer handles everything: Python venv dependencies, system tools (whois, dig, jq, exiftool), OSINT tools (maigret, sherlock, holehe, h8mail, and more), and optional headless browser + Go tools.

Platform Command
Linux / macOS
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows (Git Bash or WSL)
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows (PowerShell — manual)
git clone https://github.com/7onez/cti-expert.git "$env:USERPROFILE\.claude\skills\cti-expert"
pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"

Windows users: The installer script runs natively in Git Bash (bundled with Git for Windows) or WSL. PowerShell is a fallback that installs Python dependencies only.


Installer Options

bash scripts/install.sh               # Core: Python deps + system tools + OSINT tools
bash scripts/install.sh --headless    # + Scrapling headless browser (~200MB Chromium)
bash scripts/install.sh --go          # + Go tools (subfinder, amass, gau, gitleaks, httpx)
bash scripts/install.sh --all         # + Everything above
FlagWhat it installsSize
(none)Python packages, whois, dig, jq, exiftool, maigret, sherlock, holehe, h8mail, theHarvester, trufflehog, waymore, xeuledoc, agentflow~50 MB
--headlessScrapling StealthyFetcher + DynamicFetcher + Chromium+200 MB
--gosubfinder, amass, gau, gitleaks, httpx, phoneinfoga+150 MB
--allEverything~400 MB

Verify Installation

claude   # opens Claude Code CLI
# then type:
/cti-expert

If the skill loads, you’ll see the CTI Expert command menu. Type /cti-expert /help for the full command list.


Alternative — Claude Code Desktop (macOS / Windows)

Download: claude.ai/download — available for macOS and Windows

Step-by-step (no terminal needed):

  1. Install Claude Code Desktop — Download from claude.ai/download and install the app

  2. Download CTI Expert — Go to the GitHub repository, click the green “Code” button, then select “Download ZIP”

  3. Extract to your skills folder — Unzip the downloaded file, then move the extracted folder to your skills directory and rename it to cti-expert:

    PlatformHow to navigate
    macOSOpen Finder → Press Cmd + Shift + G → Type ~/.claude/skills/ → Press Go → Move the folder here
    WindowsOpen File Explorer → Type %USERPROFILE%\.claude\skills\ in the address bar → Press Enter → Move the folder here

    Note: If the skills folder does not exist, create it inside the .claude folder first.

  4. Run the installer — Open Claude Code Desktop terminal and run:

    bash ~/.claude/skills/cti-expert/scripts/install.sh

    Or on Windows PowerShell (Python only):

    pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"
  5. Restart Claude Code Desktop — Close and reopen the app

  6. Verify — Type /cti-expert in the chat to confirm the skill is loaded

System Requirements
RequirementVersionPurpose
Claude Code CLILatestRecommended terminal runtime
Claude Code DesktopLatestGUI runtime (macOS/Windows)
Node.js18+Required by Claude Code CLI
Python3.10+DOCX report generation, Scrapling, AgentFlow
pip packagesSee requirements.txtCharts, diagrams, styling
gitAnyClone the repository



Quick Start

How to run commands: All commands below use the /cti-expert prefix. Type /cti-expert followed by the command in Claude Code.

Example: /cti-expert /case example.com — not just /case example.com

1 — Full Autonomous Case

/cti-expert /case example.com

Runs every applicable technique for the target type. Auto-generates .md and .docx reports.

2 — Guided Flows

/cti-expert /flow person           # Person investigation workflow
/cti-expert /flow domain           # Domain reconnaissance workflow
/cti-expert /flow image            # Image verification workflow

3 — Targeted Reconnaissance

/cti-expert /sweep @username                    # Multi-vector recon on handle
/cti-expert /query example.com                  # 12-15 advanced search queries
/cti-expert /username johndoe                   # Platform enumeration (3000+)
/cti-expert /email-deep user@domain.com         # Deep email investigation
/cti-expert /subdomain example.com              # Certificate transparency + brute-force
/cti-expert /threat-check 185.1.1.1             # IP/domain/URL threat intelligence
/cti-expert /scam-check suspicious-site.xyz     # Phishing/scam domain check
/cti-expert /breach-deep user@domain.com        # Multi-source breach lookup

4 — Analysis & Assessment

/cti-expert /exposure domain.com                # Composite risk score (0-100)
/cti-expert /threat-model                       # Build threat model from findings
/cti-expert /validate                           # Verify all findings
/cti-expert /coverage                           # Check investigation completeness

5 — Reporting

/cti-expert /report                             # Technical INTSUM report
/cti-expert /report brief                       # Executive summary
/cti-expert /brief                              # Plain-language summary
/cti-expert /workspace save                     # Save workspace + auto-generate .docx



Features

Identity & People

  • Person lookup — 50+ data points
  • Phone — carrier, reputation, associations
  • Email — accounts, breaches, infrastructure
  • Username — 3000+ platform enumeration

Domain & Infrastructure

  • Subdomain enumeration via CT logs
  • CMS, CDN, analytics fingerprinting
  • DNS forensics & WHOIS deep/reverse
  • Traffic analysis & audience demographics

Analysis & Verification

  • Face search (FaceCheck.id) & reverse image (TinEye)
  • Image forensics (FotoForensics, Forensically)
  • AI photo geolocation (picarta.ai, GeoSpy)
  • Document/email metadata forensics
  • Google Docs identity extraction
  • 100+ paste sites & breach DBs

WiFi, Geo & Transport

  • SSID/BSSID lookup via Wigle.net
  • W3W, Plus Codes, MGRS, Street View
  • Aircraft tracking (ADS-B Exchange, Flightradar24)
  • Vessel tracking (Marine Traffic, VesselFinder)
  • Vehicle VIN lookup & plate recognition

Security Auditing

  • Cloud audit (AWS/GCP/Azure)
  • OWASP Top 10 source code review
  • CVE & supply chain vulnerability checks
  • LLM/agent/MCP prompt injection audit

Reporting & Export

  • INTSUM, executive brief, plain-language
  • DOCX with charts, diagrams, timelines
  • Save/load case workspaces
  • Legal, journalist, HR, threat analyst formats



AEAD Case Lifecycle

Every investigation follows four automated phases:

                         ╭──────────────────────────────────────╮
                         │         AEAD CASE LIFECYCLE          │
                         ╰──────────────────────────────────────╯

   ┌─── ACQUIRE ────────────────────────────────────────────────────────┐
   │  Collect raw data via /sweep, /query, /username, /phone, etc.     │
   │  Database search, enumeration, collection gap logging             │
   └────────────────────────────────┬───────────────────────────────────┘

   ┌─── ENRICH ─────────────────────────────────────────────────────────┐
   │  Expand leads via /branch, /crossref, /link-subjects, /signatures │
   │  Shared identifier detection, relationship mapping                │
   └────────────────────────────────┬───────────────────────────────────┘

   ┌─── ASSESS ─────────────────────────────────────────────────────────┐
   │  Score & verify via /exposure, /threat-model, /validate, /coverage│
   │  Risk scoring, completeness check, evidence chains                │
   └────────────────────────────────┬───────────────────────────────────┘

   ┌─── DELIVER ────────────────────────────────────────────────────────┐
   │  Package output via /report, /brief, /render, /workspace save     │
   │  Auto-save .md + .docx with charts & diagrams                     │
   └────────────────────────────────────────────────────────────────────┘

Run /progress at any point to see current phase and pending tasks.




Command Reference

Full command list: See SKILL.md for comprehensive reference.

Acquire — Data collection commands
CommandPurpose
/cti-expert /case [target]Full pipeline — every applicable technique
/cti-expert /sweep [target]Multi-vector recon (person/domain/org/username/email/IP)
/cti-expert /query [subject]12-15 advanced search operator queries
/cti-expert /username [handle]3000+ platform enumeration
/cti-expert /phone [number]Carrier lookup, reputation, associations
/cti-expert /email-deep [email]Accounts, breaches, infrastructure
/cti-expert /subdomain [domain]CT logs + passive enumeration
/cti-expert /threat-check [target]IP/domain/URL/hash threat intelligence
/cti-expert /breach-deep [email]Multi-source breach lookup
Enrich — Lateral expansion commands
CommandPurpose
/cti-expert /branch [data]Lateral expansion (email→username, username→email, etc.)
/cti-expert /crossrefShared identifier detection across subjects
/cti-expert /link-subjects [A] [B]Define connection between subjects
/cti-expert /show-connectionsDisplay logged connections
/cti-expert /graphFull ASCII subject relationship map
Assess — Scoring & verification commands
CommandPurpose
/cti-expert /exposure [target]Composite risk score (0-100)
/cti-expert /threat-modelBuild threat model from findings
/cti-expert /validateVerify finding evidence chains
/cti-expert /coverageCheck investigation completeness
Deliver — Report generation commands
CommandPurpose
/cti-expert /reportTechnical INTSUM report
/cti-expert /report briefExecutive summary
/cti-expert /briefPlain-language summary
/cti-expert /workspace saveSave workspace + auto-generate .docx



Skill Tiers

Novice Practitioner Specialist

Low-jargon mode, step-by-step guidance, pre-built templates for due diligence, background checks, security reviews.

Entry: /cti-expert /flow person, /cti-expert /flow domain, /cti-expert /template list

Advanced search operators, manual pivot expansion, custom threat modeling, guided flows with explanation.

Entry: /cti-expert /query [target], /cti-expert /branch [data], /cti-expert /crossref, /cti-expert /threat-model

Raw technique access, custom evidence weighting, CONTESTED finding resolution, direct database queries.

Entry: /cti-expert /username [handle], /cti-expert /email-deep [email], /cti-expert /secrets [target], /cti-expert /threat-check [target]




Technique Catalog

35 techniques — click to expand full catalog
TechniqueCoverageAPI Key Required?
fx-metadata-parsing.mdEXIF, email headers, document forensicsNo
fx-image-verification.mdImage authenticity, provenance, reverse searchNo
fx-breach-discovery.mdBreach database + paste site enumerationOptional (HIBP bulk, DeHashed paid)
fx-http-fingerprint.mdHTTP signature analysis, server fingerprintingNo
fx-leak-monitoring.mdLeak and breach monitoring automationMixed (IntelligenceX/Shodan paid)
fx-dns-cert-history.mdHistorical DNS + SSL/TLS certificate timelineNo
fx-document-forensics.mdPDF/Office authorship, creation chain, hidden contentNo
fx-network-mapping.mdNetwork topology, entity graph constructionNo
username-osint.md3000+ platform enumerationNo
phone-osint.mdCarrier lookup, VoIP, FreeCNAM, WhoCalldNo
email-osint.mdDeep email investigation, breach historyNo
threat-intel.mdGreyNoise, AbuseIPDB, OTX, VirusTotal, CIRCL CVE, NVDOptional (VT/URLScan free keys)
web-traffic-analysis.mdSimilarWeb, Semrush estimationNo
domain-advanced.mdCT logs, Amass, Subfinder, passive enumNo
social-media-platforms.mdTwitter/X, Discord, Strava, BlueSky, ShareTrace, Reddit, Instagram, TikTok, TelegramPartial (Discord needs token)
image-forensics-and-face-search.mdFaceCheck.id, TinEye, FotoForensics, Forensically, picarta.ai, GeoSpy, Pic2MapNo
blockchain-investigation.mdBlockchair, Etherscan, WalletExplorer, OXT.me, Chainabuse, BreadcrumbsOptional (Etherscan API for bulk)
transport-tracking.mdADS-B Exchange, Flightradar24, Marine Traffic, VesselFinder, VIN decodeNo
darknet-investigation.mdAhmia.fi, onionsearch, DarknetLive, ransomwatchNo
advanced-geolocation-techniques.mdW3W, Plus Codes, MGRS, Overpass TurboNo
wifi-ssid-osint.mdWigle.net SSID/BSSID geolocationFree account (Wigle API)
web-dns-forensics.mdZone transfers, GitHub, Telegram, WHOISOptional (WHOIS API)
scam-check.mdPhishing/scam domain verificationNo
ioc-export.mdIOC export (STIX 2.1, flat list)No
cloud-audit.mdAWS/GCP/Azure IAM, network, compute auditNo
dependency-audit.mdCVE, supply chain, CI/CD securityNo
disk-forensics.mdSleuth Kit, file carving, artifact recoveryNo
incident-triage.mdNIST 800-61, containment, IOC extractionNo
owasp-audit.mdOWASP Top 10 source code reviewNo
prompt-injection-audit.mdLLM/agent/MCP security assessmentNo
fx-visitor-intelligence.mdVisitor stats, tech stack, geo analysisNo
fx-social-topology.mdSocial graph construction and analysisNo
fx-geolocation.mdGPS, W3W, Plus Codes, MGRS, Street ViewNo
secret-scanning.mdCredential/secret detection in codeOptional (GitHub token for GitDorker)
fx-email-header-analysis.mdEmail header analysis, SPF/DKIMNo



Report Formats

Every /report, /brief, and /case auto-saves two files:

Markdown Report

  • INTSUM format (technical)
  • Executive brief (decision-makers)
  • Plain-language summary (non-technical)
  • Legal evidence format (attorneys)

Word Document (.docx)

  • Cover page with classification
  • Table of contents & styled finding cards
  • Charts: pie, bar, gauge, timeline
  • Entity relationship & network topology diagrams
  • Source attribution table with page numbers

Generated by scripts/generate-cti-docx.py




Architecture

Project structure — click to expand
cti-expert/
├── SKILL.md                       Command reference & skill definition
├── README.md                      This file

├── engine/                        Case data model & state management
│   ├── subject-registry.md        How subjects are tracked
│   ├── finding-framework.md       Finding lifecycle & evidence chains
│   ├── workspace-format.md        Workspace serialization spec
│   └── conflict-resolver.md       CONTESTED finding resolution

├── techniques/                    Collection techniques (32 files)
│   ├── whois-universal.md         Universal multi-TLD WHOIS cascade
│   ├── web-collection-scrapling.md Scrapling adaptive web collection
│   ├── agentflow-enrichment.md    Parallel enrichment orchestration
│   ├── fx-metadata-parsing.md, fx-image-verification.md, ...
│   ├── username-osint.md, phone-osint.md, email-osint.md
│   ├── cloud-audit.md, dependency-audit.md, disk-forensics.md
│   └── ...

├── experience/                    UX, tiers, guided flows
│   ├── guided-flows/              Interactive workflows
│   ├── case-templates/            Pre-built case templates
│   └── accessibility/             Glossary, low-jargon mode

├── analysis/                      Pattern detection & intelligence engines
│   ├── deviation-detector.md      Behavioral anomaly detection
│   ├── cross-reference-engine.md  Shared identifier detection
│   └── exposure-model.md          Risk score calculation

├── output/                        Report & visualization specs
│   ├── reports/                   Report templates
│   └── visuals/                   Chart & render engine specs

├── scripts/                       DOCX report generation
│   ├── generate-cti-docx.py       Main generator
│   ├── cti_docx_charts.py         Chart rendering
│   ├── cti_docx_diagrams.py       Entity relationship diagrams
│   └── requirements.txt           Python dependencies

├── workflows/                     Professional use-case guides
│   ├── wf-journalist.md           Journalist source verification
│   ├── wf-threat-analyst.md       Cyber threat intelligence
│   └── wf-hr-screening.md        Background checks

├── guides/walkthroughs/           Worked case examples
│   ├── walkthrough-person-lookup.md
│   ├── walkthrough-domain-sweep.md
│   └── walkthrough-username-trace.md

└── validation/                    Quality assurance
    ├── coverage-matrix.md         Investigation area coverage
    ├── quality-scoring.md         Finding scoring methodology
    └── verification-checklist.md  Evidence chain validation



Professional Workflows

WorkflowAudienceFile
Journalist Source VerificationReporters, fact-checkersworkflows/wf-journalist.md
HR ScreeningHR professionals, recruitersworkflows/wf-hr-screening.md
Cyber Threat IntelligenceSecurity analysts, IR teamsworkflows/wf-threat-analyst.md
Private InvestigatorLicensed PIs, legal teamsworkflows/wf-private-investigator.md

Activate with /cti-expert /flow [type] for interactive guided prompts.




Ethics & Responsible Use

This skill is for lawful research and professional security investigation only.

Permitted Prohibited
  • Journalist fact-checking & source verification
  • HR background screening (with consent)
  • Corporate security research & threat intelligence
  • Authorized penetration testing & security audits
  • Legal/compliance investigation
  • Personal reputation monitoring (self-search)
  • Doxxing, harassment, or stalking
  • Unauthorized surveillance
  • Social engineering or fraud
  • Privacy violations
  • Criminal activity

You are responsible for all use of this skill. Comply with local laws, regulations, and platform terms of service. Always respect privacy and consent boundaries.




Contributing

We welcome research contributions, new techniques, and workflow improvements.

Contribution guidelines

Adding techniques:

  1. Create techniques/fx-[name].md with method description, free tool lists, limitations

Workflow improvements:

  1. Document in workflows/ with success criteria

Pull request process:

  1. Fork and create feature branch: git checkout -b feature/technique-name
  2. Document changes in SKILL.md and README.md
  3. Test on at least 3 real-world targets
  4. Submit PR with description

Bug reports: File issues with command output, environment, and target type.




License

MIT License + Ethical Use Addendum

You are free to use, modify, and distribute this skill under the MIT license, provided that you include original attribution, comply with the ethical use guidelines above, and clearly mark any derivatives.

See LICENSE for full text.




Made with purpose by Hieu Ngo

LinkedIn  Email  Website  GitHub

If this tool helps your work, consider giving it a star. It helps others find it.




:vietnam: CTI Expert — Tình Báo Mối Đe Dọa Mạng & OSINT


CTI Expert là gì?

Một kỹ năng của Claude Code biến Claude thành một nhà phân tích tình báo mối đe dọa mạng và tình báo nguồn mở chuyên nghiệp. Chạy thu thập tình báo có cấu trúc sử dụng 67+ lệnh trên 35 kỹ thuật — không cần API key cho chức năng cốt lõi. Một số kỹ thuật hỗ trợ API key miễn phí tùy chọn để truy cập nâng cao (VD: Wigle, VirusTotal, URLScan.io).

Mới trong v2.2: Pháp y hình ảnh & tìm kiếm khuôn mặt (FaceCheck.id, TinEye, FotoForensics, picarta.ai AI geolocation), điều tra blockchain (Blockchair, Etherscan, WalletExplorer, Chainabuse), theo dõi vận tải (ADS-B Exchange theo dõi máy bay, Marine Traffic theo dõi tàu, VIN decoder), điều tra darknet (Ahmia.fi tìm kiếm Tor, ransomwatch), mạng xã hội mở rộng (Reddit, Instagram, TikTok, Telegram), tra cứu người (TruePeopleSearch, IDCrawl), 11 mẫu Google mega-dork bao phủ 73 domain.

Mới trong v2.1: Trực quan hóa đường tấn công (/cti-expert /render threat-path), bề mặt tấn công (/cti-expert /render attack-surface), xuất IOC STIX 2.1 (/cti-expert /report ioc), theo dõi rủi ro theo thời gian (/cti-expert /drift), ảnh chụp Wayback (/cti-expert /snapshots, /cti-expert /diff), hướng dẫn người mới (/cti-expert /onboard), giải thích phát hiện (/cti-expert /clarify), phân tích khoảng trống (/cti-expert /blind-spots), kiểm tra nguồn (/cti-expert /source-check), so sánh phiên (/cti-expert /workspace diff), điểm chất lượng (/cti-expert /quality), thang độ tin cậy nguồn A-F, 4 loại thực thể mới.

Khả năng cốt lõi: Trinh sát đa vector trên mọi loại mục tiêu (cá nhân, tên miền, tổ chức, tên người dùng, email, IP, WiFi) với xác thực phát hiện tự động, chấm điểm rủi ro phơi bày, và báo cáo tình báo có cấu trúc ở nhiều định dạng.

Quy trình: Vòng đời AEAD — Thu thập dữ liệu thô → Làm giàu bằng mở rộng pivot → Đánh giá phát hiện → Phân phối báo cáo có cấu trúc (Markdown + Word với biểu đồ, sơ đồ, định dạng chuyên nghiệp).


Cài đặt

Khuyến nghị: Dùng Claude Code CLI — cho phép sử dụng đầy đủ workflow terminal, phiên làm việc liên tục và gọi skill trực tiếp. Tải tại đây hoặc chạy npm install -g @anthropic-ai/claude-code.

Tại sao nên dùng Claude Code CLI?

Toàn bộ workflow CTI Expert được tối ưu cho Claude Code CLI:

  • Phiên làm việc liên tục — điều tra được lưu qua /cti-expert /workspace save
  • Truy cập đầy đủ công cụ — ghi file, chạy Python, tạo DOCX, tất cả chạy tự nhiên
  • Gọi skill trực tiếp — gõ /cti-expert ngay trong terminal
  • Agent song song — AgentFlow hoạt động tốt nhất với CLI

Bước 1 — Cài đặt Claude Code CLI

npm install -g @anthropic-ai/claude-code

Yêu cầu Node.js 18+. Tài liệu đầy đủ: docs.anthropic.com/en/docs/claude-code/overview


Bước 2 — Clone + Cài đặt all-in-one

Script scripts/install.sh xử lý tất cả: Python venv, công cụ hệ thống (whois, dig, jq, exiftool), công cụ OSINT (maigret, sherlock, holehe, h8mail, …), và tùy chọn headless browser + Go tools.

Hệ điều hành Lệnh
Linux / macOS
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows (Git Bash hoặc WSL)
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows (PowerShell — thủ công)
git clone https://github.com/7onez/cti-expert.git "$env:USERPROFILE\.claude\skills\cti-expert"
pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"

Người dùng Windows: Script chạy trong Git Bash (đi kèm Git for Windows) hoặc WSL. PowerShell là phương án dự phòng chỉ cài Python dependencies.


Tùy chọn installer

bash scripts/install.sh               # Cơ bản: Python + công cụ hệ thống + OSINT tools
bash scripts/install.sh --headless    # + Scrapling headless browser (~200MB Chromium)
bash scripts/install.sh --go          # + Go tools (subfinder, amass, gau, gitleaks, httpx)
bash scripts/install.sh --all         # + Tất cả
FlagCài gìKích thước
(không có)Python packages, whois, dig, jq, exiftool, maigret, sherlock, holehe, h8mail, theHarvester, trufflehog, waymore, xeuledoc, agentflow~50 MB
--headlessScrapling StealthyFetcher + DynamicFetcher + Chromium+200 MB
--gosubfinder, amass, gau, gitleaks, httpx, phoneinfoga+150 MB
--allTất cả~400 MB

Kiểm tra cài đặt

claude   # mở Claude Code CLI
# sau đó gõ:
/cti-expert

Tùy chọn khác — Claude Code Desktop (macOS / Windows)

Tải về: claude.ai/download — hỗ trợ macOSWindows

  1. Cài đặt Claude Code Desktop — Tải từ claude.ai/download và cài đặt ứng dụng

  2. Tải CTI Expert — Vào kho GitHub, nhấn nút “Code” màu xanh, sau đó chọn “Download ZIP”

  3. Giải nén vào thư mục skills — Giải nén file đã tải, di chuyển thư mục vào thư mục skills và đổi tên thành cti-expert:

    Hệ điều hànhCách điều hướng
    macOSMở Finder → Nhấn Cmd + Shift + G → Nhập ~/.claude/skills/ → Nhấn Go
    WindowsMở File Explorer → Nhập %USERPROFILE%\.claude\skills\ vào thanh địa chỉ → Nhấn Enter
  4. Chạy installer — Mở terminal trong Claude Code Desktop:

    bash ~/.claude/skills/cti-expert/scripts/install.sh

    Hoặc trên Windows PowerShell (chỉ Python):

    pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"
  5. Khởi động lại Claude Code Desktop — Đóng và mở lại ứng dụng

  6. Xác nhận — Gõ /cti-expert trong chat để xác nhận skill đã được tải

Yêu cầu hệ thống
Yêu cầuPhiên bảnMục đích
Claude Code CLIMới nhấtKhuyến nghị — runtime terminal
Claude Code DesktopMới nhấtRuntime giao diện (macOS/Windows)
Node.js18+Yêu cầu bởi Claude Code CLI
Python3.10+Tạo báo cáo DOCX, Scrapling, AgentFlow
pip packagesXem requirements.txtBiểu đồ, sơ đồ, định dạng
gitBất kỳClone repository

Bắt đầu nhanh

/cti-expert /case example.com                   # Chạy case tự động hoàn toàn
/cti-expert /flow person                        # Quy trình điều tra cá nhân
/cti-expert /flow domain                        # Quy trình trinh sát tên miền
/cti-expert /sweep @username                    # Trinh sát đa vector trên handle
/cti-expert /query example.com                  # 12-15 truy vấn tìm kiếm nâng cao
/cti-expert /username johndoe                   # Liệt kê nền tảng (3000+)
/cti-expert /email-deep user@domain.com         # Điều tra email chuyên sâu
/cti-expert /exposure domain.com                # Điểm rủi ro tổng hợp (0-100)
/cti-expert /report                             # Báo cáo kỹ thuật INTSUM
/cti-expert /workspace save                     # Lưu workspace + tự động tạo .docx

Tính năng theo lĩnh vực

Lĩnh vựcKhả năng
Danh tính & Con ngườiTra cứu cá nhân (50+ điểm dữ liệu), điều tra số điện thoại, email chuyên sâu, liệt kê tên người dùng (3000+ nền tảng)
Tên miền & Hạ tầngLiệt kê subdomain, fingerprint kỹ thuật, pháp y DNS, phân tích lưu lượng
Phân tích & Xác minhXác minh hình ảnh, pháp y metadata, pháp y web, cơ sở dữ liệu rò rỉ
WiFi & Định vịĐịnh vị WiFi qua Wigle.net, định vị nâng cao (W3W, Plus Codes, MGRS)
Kiểm tra bảo mậtKiểm tra đám mây (AWS/GCP/Azure), kiểm tra OWASP, kiểm tra dependency, kiểm tra prompt injection
Báo cáo & XuấtBáo cáo Markdown, DOCX với biểu đồ, workspace case, định dạng chuyên nghiệp

Đạo đức & Sử dụng có trách nhiệm

Kỹ năng này chỉ dành cho nghiên cứu hợp pháp và điều tra bảo mật chuyên nghiệp.

Được phép: Xác minh nguồn báo chí, sàng lọc nhân sự (có sự đồng ý), nghiên cứu bảo mật doanh nghiệp, kiểm tra xâm nhập được ủy quyền, điều tra pháp lý/tuân thủ, giám sát danh tiếng cá nhân.

Cấm: Doxxing, quấy rối, theo dõi, giám sát trái phép, kỹ thuật xã hội, gian lận, vi phạm quyền riêng tư, hoạt động tội phạm.


Tác giả: Hieu Ngohieu.ngo@chongluadao.vnPhiên bản: 2.2 • Giấy phép: MIT


:cn: CTI Expert — 网络威胁情报与开源情报


什么是 CTI Expert?

一个 Claude Code 技能,将 Claude 转变为���练有素的网络威胁情报和开源情报分析师。使用 67+ 个命令35 种技术进行结构化情报收集——核心功能无需 API 密钥。部分技术支持可选的免费 API 密钥以获取增强访问(如 Wigle、VirusTotal、URLScan.io)。

v2.2 新功能: 图像取证与人脸搜索(FaceCheck.id、TinEye、FotoForensics、picarta.ai AI地理定位)、区块链调查(Blockchair、Etherscan、WalletExplorer、Chainabuse)、交通追踪(ADS-B Exchange飞机追踪、Marine Traffic船舶追踪、VIN解码器)、暗网调查(Ahmia.fi Tor搜索、ransomwatch)、社交媒体扩展(Reddit、Instagram、TikTok、Telegram)、人员搜索(TruePeopleSearch、IDCrawl)、11个跨平台Google mega-dork模板覆盖73个域名。

v2.1 新功能: 攻击路径可视化(/cti-expert /render threat-path)、攻击面映射(/cti-expert /render attack-surface)、STIX 2.1 IOC 导出(/cti-expert /report ioc)、时间风险追踪(/cti-expert /drift)、Wayback 快照(/cti-expert /snapshots/cti-expert /diff)、新手引导(/cti-expert /onboard)、发现解释(/cti-expert /clarify)、盲点分析(/cti-expert /blind-spots)、来源检查(/cti-expert /source-check)、会话比较(/cti-expert /workspace diff)、质量评分(/cti-expert /quality)、来源可靠性 A-F 等级、4 种新实体类型。

核心能力: 对任何目标类型(个人、域名、组织、用户名、电子邮件、IP、WiFi)进行多向量侦察,具备自动发现验证、暴露风险评分,以及多格式结构化情报交付。

工作流程: AEAD 生命周期——获取原始数据 → 通过枢轴扩展丰富 → 评估发现 → 交付结构化报告(Markdown + 带图表、图形、专业格式的 Word 文档)。


安装

推荐: 使用 Claude Code CLI — 提供完整的终端工作流、持久会话和直接技能调用。点击下载 或运行 npm install -g @anthropic-ai/claude-code

为什么推荐 Claude Code CLI?

整个 CTI Expert 工作流针对 Claude Code CLI 进行了优化:

  • 持久会话 — 调查通过 /cti-expert /workspace save 跨重启保存
  • 完整工具访问 — 文件写入、Python 脚本、DOCX 生成均原生运行
  • 直接调用技能 — 在终端中直接输入 /cti-expert
  • 并行 Agent — AgentFlow 在 CLI 下运行效果最佳

第一步 — 安装 Claude Code CLI

npm install -g @anthropic-ai/claude-code

需要 Node.js 18+。完整文档:docs.anthropic.com/en/docs/claude-code/overview


第二步 — 克隆 + 一键安装

scripts/install.sh 安装脚本处理所有内容:Python venv 依赖、系统工具(whoisdigjqexiftool)、OSINT 工具(maigretsherlockholeheh8mail 等),以及可选的无头浏览器和 Go 工具。

操作系统 命令
Linux / macOS
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows(Git Bash 或 WSL)
git clone https://github.com/7onez/cti-expert.git ~/.claude/skills/cti-expert
bash ~/.claude/skills/cti-expert/scripts/install.sh
Windows(PowerShell — 手动)
git clone https://github.com/7onez/cti-expert.git "$env:USERPROFILE\.claude\skills\cti-expert"
pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"

Windows 用户: 安装脚本在 Git Bash(随 Git for Windows 附带)或 WSL 中原生运行。PowerShell 是仅安装 Python 依赖的备用方案。


安装选项

bash scripts/install.sh               # 基础:Python 依赖 + 系统工具 + OSINT 工具
bash scripts/install.sh --headless    # + Scrapling 无头浏览器(~200MB Chromium)
bash scripts/install.sh --go          # + Go 工具(subfinder、amass、gau、gitleaks、httpx)
bash scripts/install.sh --all         # + 以上所有内容
标志安装内容大小
(无)Python 包、whois、dig、jq、exiftool、maigret、sherlock、holehe、h8mail、theHarvester、trufflehog、waymore、xeuledoc、agentflow~50 MB
--headlessScrapling StealthyFetcher + DynamicFetcher + Chromium+200 MB
--gosubfinder、amass、gau、gitleaks、httpx、phoneinfoga+150 MB
--all全部内容~400 MB

验证安装

claude   # 打开 Claude Code CLI
# 然后输入:
/cti-expert

备选方案 — Claude Code 桌面版(macOS / Windows)

下载:claude.ai/download — 支持 macOSWindows

  1. 安装 Claude Code 桌面版 — 从 claude.ai/download 下载并安装应用

  2. 下载 CTI Expert — 访问 GitHub 仓库,点击绿色 “Code” 按钮,然后选择 “Download ZIP”

  3. 解压到 skills 文件夹 — 解压文件,将文件夹重命名为 cti-expert 并移动到:

    操作系统路径
    macOS~/.claude/skills/ (Finder → Cmd+Shift+G)
    Windows%USERPROFILE%\.claude\skills\ (文件资源管理器地址栏)
  4. 运行安装脚本 — 在 Claude Code Desktop 终端中运行:

    bash ~/.claude/skills/cti-expert/scripts/install.sh

    或在 Windows PowerShell(仅 Python):

    pip3 install -r "$env:USERPROFILE\.claude\skills\cti-expert\scripts\requirements.txt"
  5. 重启 Claude Code 桌面版 — 关闭并重新打开应用

  6. 验证 — 输入 /cti-expert 确认技能已加载

系统要求
要求版本用途
Claude Code CLI最新版推荐 — 终端运行时
Claude Code 桌面版最新版图形界面运行时(macOS/Windows)
Node.js18+Claude Code CLI 所需
Python3.10+DOCX 报告生成、Scrapling、AgentFlow
pip 包requirements.txt图表、图形、样式
git任意版本克隆仓库

快速入门

/cti-expert /case example.com                   # 完全自动案例
/cti-expert /flow person                        # 人员调查流程
/cti-expert /flow domain                        # 域名侦察流程
/cti-expert /sweep @username                    # 对账号进行多向量侦察
/cti-expert /query example.com                  # 12-15 个高级搜索查询
/cti-expert /username johndoe                   # 平台枚举(3000+)
/cti-expert /email-deep user@domain.com         # 深度电子邮件调查
/cti-expert /exposure domain.com                # 综合风险评分(0-100)
/cti-expert /report                             # 技术 INTSUM 报告
/cti-expert /workspace save                     # 保存工作空间 + 自动生成 .docx

功能领域

领域能力
身份与人员人员查询(50+ 数据点)、电话调查、深度邮件分析、用户名枚举(3000+ 平台)
域名与基础设施子域枚举、技术指纹、DNS 取证、流量分析
分析与验证图像验证、元数据取证、网页取证、泄露数据库
WiFi 与地理定位通过 Wigle.net WiFi 定位、高级地理定位(W3W、Plus Codes、MGRS)
安全审计云审计(AWS/GCP/Azure)、OWASP 审计、依赖审计、提示注入审计
报告与导出Markdown 报告、带图表的 DOCX、案例工作空间、专业格式

道德与负责任使用

此技能仅用于合法研究和专业安全调查。

允许: 新闻事实核查、人力资源筛选(需征得同意)、企业安全研究、授权渗透测试、法律/合规调查、个人声誉监控。

禁止: 人肉搜索、骚扰、跟踪、未授权监控、社会工程、欺诈、隐私侵犯、犯罪活动。


作者: Hieu Ngohieu.ngo@chongluadao.vn版本: 2.2 • 许可证: MIT