If you have questions about our reports or services please use the Contact Us page to get in touch. Thank you.

Security Researcher

You’re a security researcher who wants to analyze case artifacts for learning and/or fun and is not doing so on behalf of an organization (see the next option). The following artifacts will be shared with the subscriber using our threat intelligence platform:

Dropped files
Memory captures
Event logs
Ransom samples

Security Researcher use


You’re an organization who uses our reports and/or artifacts for profit or you protect your organization using our work. This service receives access to all artifacts and IOCs from our honeypots as well as access to our threat intelligence platform (TIP). This includes reported and unreported cases.

This service also includes access to the TIP’s API to pull IOCs/events. Includes email Q&A as time permits. If you need a receipt for this purchase please use the Contact Us page to get in touch.

Internal use

Threat Feed

We track infrastructure related to Cobalt Strike, Qbot/Qakbot, PoshC2, Covenant, Metasploit, Empire, Meterpreter stagers and more using a variety of different methods. We are currently tracking over 1300+ confirmed Cobalt Strike servers, 500+ Metasploit servers, 20+ PS Empire servers, 70+ Covenant servers and more.

This threat feed is made available using our threat intel platform which can be accessed via a GUI or API. The feeds can be exported to txt, csv, STIX, MISP, etc. as needed to import into your IDS, SIEM, and/or Threat Intelligence Platform or they can be synced to your TIP. We can provide a script if needed to download the feed from our API.

We have two options for this service, internal use and commercial use. Please Contact Us for pricing.

All Intel

This service includes all of the above plus long term infrastructure tracking, Cobalt Strike config & Beacons, OSINT linking, malware tagging, ransomware association, and other curated intel. Please Contact Us for pricing.