CTI Expert

Cyber threat intelligence and open-source intelligence (OSINT) investigation skill. Turns Claude into a trained CTI/OSINT analyst. Generates precision search queries, interprets public data, builds case timelines, and delivers structured intelligence products — no API keys required.

Think of it as having a professional threat intelligence analyst on your team who speaks multiple languages, knows every advanced search technique, and can piece together evidence across hundreds of public data sources.

What This Skill Does

CTI Expert conducts multi-source investigations into digital footprints, organizations, domains, credentials, and security threats. It handles everything from username enumeration across 3000+ platforms to building threat models from scattered clues.

The skill runs guided case workflows (Acquire → Enrich → Assess → Deliver) that keep investigations organized and verifiable. Every finding is sourced, timestamped, and confidence-scored. You get formal intelligence reports suitable for legal proceedings, executive briefs for decision-makers, or technical threat assessments.

Quick Start

# Full autonomous case — investigates everything applicable
/case target.com

# Guided workflow for beginners
/flow person

# Summary of findings so far
/brief

# Generate formal report
/report

Append --yolo to any command to skip confirmations and let the analyst decide autonomously.

Investigation Phases

Every case follows the AEAD lifecycle:

PhaseWhat HappensExamples
AcquireCollect raw datasweep domains, enumerate usernames, check breaches
EnrichExpand and connect leadsbranch identifiers, build timelines, cross-reference
AssessScore and verify findingsexpose score, threat models, validation checks
DeliverPackage outputformal reports, executive briefs, IOC exports

Run /progress at any point to see which phase you’re in and what’s pending.

Core Capabilities

Social Media & Username Investigation

# Find a username across 3000+ platforms
/username johndoe

# Enumerate accounts, timeline, connected accounts
/sweep @johndoe

Breach & Credential Hunting

# Deep breach lookup with context
/breach-deep user@example.com

# Exposed credentials in repos and paste sites
/secrets github.com/org

Domain & IP Intelligence

# Full domain reconnaissance
/sweep example.com

# Technology fingerprint: CMS, analytics, CDN, servers
/techstack example.com

# DNS history and certificate timeline
/dns-history example.com
/cert-history example.com

Threat & Vulnerability Assessment

# Threat intelligence on domain/IP/URL/hash
/threat-check 185.1.1.1

# Phishing/malware/scam site detection
/scam-check susp-site.xyz

# CVE and vulnerability lookup
/vuln-check CVE-2024-1234

# Check if organization is ransomware victim
/ransomware-check "Acme Corp"

Cloud & Microsoft 365 Reconnaissance

# M365/Azure tenant recon — tenant ID, federation, MDI, SharePoint
/msftrecon example.com

# Google document metadata and ownership
/gdoc https://docs.google.com/document/d/...

Geographic & Transport Intelligence

# WiFi SSID geolocation
/wifi "HomeNetwork"

# Exact AP lookup by MAC address
/wifi --bssid AA:BB:CC:DD:EE:FF

Evidence & Reporting

# View archived snapshots
/snapshots example.com

# Full evidence trail for a subject
/show-trail JohnDoe

# ASCII relationship diagram
/graph

Case Management

Save and resume cases:

# Persist case state
/workspace save mycase

# Resume a saved investigation
/workspace open mycase

# Compare two cases
/workspace diff case1 case2

# List all saved cases
/workspace list

Report Formats

The skill exports intelligence in multiple formats:

FormatBest For
/reportFormal structured intelligence report
/report briefSingle-page executive summary
/report jsonRaw data for integration
/report csvSpreadsheet analysis
/report legalEvidence formatted for legal proceedings
/report journalistSource-citation-heavy format
/report iocIOCs as STIX 2.1 or flat list

Subject Types

CTI Expert tracks entities with rich relationships:

TypeSymbolExamples
Person👤Full name, alias
Username@Social handle
Email📧Address, domain
Domain🌐Site, subdomain
IP Address🖥IPv4, IPv6
Organization🏢Company, group
Phone📱E.164 format
Crypto Wallet💰Bitcoin, Ethereum address
Device🖥️Server, workstation
Image🖼️Screenshot, photograph

Command Reference

Acquire phase/case, /sweep, /username, /phone, /email-deep, /subdomain, /breach-deep, /traffic, /techstack, /threat-check, /scam-check, /vuln-check, /msftrecon, /dork-sweep, /docleak, /cert-history

Enrich phase/branch, /timeline, /crossref, /link-subjects, /show-connections, /watch, /record-finding, /graph, /pathfind

Assess phase/exposure, /threat-model, /validate, /coverage, /verify-finding, /subject, /lookup, /modify, /blind-spots, /drift

Deliver phase/report, /brief, /report json, /report csv, /report legal, /report ioc, /render entities, /render timeline, /render risk, /workspace save/open/list

Navigation/flow, /progress, /opsec, /onboard, /quality, /novice, /terms

See SKILL.md in the skill directory for the complete command reference and examples.

Best Practices

Collection Method — The skill uses agent-browser when available for JavaScript-heavy sites and infinite-scroll discovery. Falls back to web search, web fetch, and direct URL retrieval when needed. Tool limitations are logged as gaps, never case blockers.

Search Operators — CTI Expert generates 12–15 advanced search queries automatically. Each targets a specific platform or data source to maximize signal and minimize noise.

Confidence Scoring — All findings are tagged by confidence level and source. The skill will flag ambiguous or high-uncertainty findings for human verification.

OPSEC Checklist — Run /opsec during sensitive investigations to review operational security practices.

Use Cases

  • Incident response — Rapid threat assessment and attribution
  • Due diligence — Pre-partnership investigation of companies or individuals
  • Legal discovery — Evidence collection for litigation or compliance
  • Security research — Vulnerability disclosure and responsible reporting
  • Fraud investigation — Tracking digital footprints of bad actors
  • Brand protection — Monitoring for impersonation and credential abuse
  • Threat hunting — Proactive search for indicators of compromise

Prerequisites

  • No API keys or paid subscriptions required
  • Access to Claude with web search and web fetch capabilities
  • For agent-browser features: JavaScript-capable environment (Playwright MCP)
  • Scout — Quick file search and codebase exploration
  • Repomix — Full codebase context dump
  • Security — Automated security auditing