Membership Checkout

Membership Level change

You have selected the Premium Membership - Three Months membership level.

Dancho Danchev is the world's leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodlogy for processing threat intelligence leading to a successful set of hundreas of high-quality anaysis and research articles published at the industry's leading threat intelligence blog - ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's Threat Blog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, TheRegister, NYTimes, CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge.

With his research featured at RSA Europe, CyberCamp, InfoSec, GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.

Premium Content Access membership includes access to the following premium content:

  • 3 weekly podcasts on the topic of cybercrime research OSINT and threat intelligence gathering
  • access to 1,721 blog posts on the topic of cybercrime research OSINT and threat intelligence gathering
  • access to up to 10 post on a daily basis on the topic of cybercrime research OSINT and threat intelligence gathering
  • 1 weekly vlog

Including access to the following published Premium Content:

A Compilation of Currently Active 419 and Related Scams Scammer Email Addresses – An OSINT Analysis
A Compilation of Currently Active Cyber Jihad Themed Personal Email Addresses – An OSINT Analysis
A Compilation of Currently Active Full Offline Copies of Cybercrime-Friendly Forum Communities – Direct Technical Collection Download -[RAR]
Advanced Bulletproof Malicious Infrastructure Investigation – WhoisXML API Analysis
Advanced Mapping and Reconnaissance of Botnet Command and Control Infrastructure using Hostinger’s Legitimate Infrastructure – WhoisXML API Analysis
Advanced Mapping and Reconnaissance of the Emotet Botnet – WhoisXML API Analysis
Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran – Free Research Report
Astalavista Security Newsletter – 2003-2006 – Full Offline Reading Copy
Compilations of Personally Identifiable Information Including XMPP/Jabber and Personal Emails Belonging to Cybercriminals and Malicious Threat Actors Internationally – An OSINT Analysis
Cyber Intelligence – Personal Memoir – Dancho Danchev – 2021 – Download Free Copy Today!
Cybercriminals Impersonate Legitimate Security Researcher Launch a Typosquatting C&C Server Campaign – WhoisXML API Analysis
Dancho Danchev – Cyber Intelligence – Personal Memoir – Direct Download Copy Available
Dancho Danchev’s “A Qualitative and Technical Collection OSINT-Enriched Analysis of the Iranian Hacking Scene Through the Prism of the Infamous Ashiyane Digital Security Team” Report – [PDF]
Dancho Danchev’s “Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran” Report – [PDF]
Dancho Danchev’s “Building and Implementing a Successful Information Security Policy” White Paper – [PDF]
Dancho Danchev’s “Cyber Jihad vs Cyberterrorim – Separating Hype from Reality” Presentation – [PDF]
Dancho Danchev’s “Exposing Koobface – The World’s Largest Botnet” Presentation – [PDF]
Dancho Danchev’s “Exposing the Dynamic Money Mule Recruitment Ecosystem” Presentation – [PDF]
Dancho Danchev’s “Intell on the Criminal Underground – Who’s Who in Cybercrime for 2007” Presentation – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 01 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 02 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 03 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 04 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 05 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 06 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 07 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 08 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 09 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 10 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 11 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 12 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 13 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 14 – [PDF]
Dancho Danchev’s Comeback Livestream Today – Join me on Facebook Live!
Dancho Danchev’s Privacy and Security Research Compilation – Medium Account Research Compilation – [PDF]
Dancho Danchev’s Research for Unit-123.org – Direct Download Copy Available
Dancho Danchev’s Research for Webroot – Direct Download Copy Available
Dancho Danchev’s Security Articles and Research for ZDNet’s Zero Day Blog – Full Offline Copy Available – [PDF]
Dancho Danchev’s Security/OSINT/Cybercrime Research and Threat Intelligence Gathering Research Compilations – [PDF]
Dancho Danchev’s Twitter Archive – Direct Download – [ZIP]
Exposing 29A Virus Coding Group – An OSINT Analysis
Exposing a Botnet/Crypters and RATs (Remote Access Tools) Source Code Portfolio – Direct Technical Download – [RAR]
Exposing a Boutique Fraudulent and Rogue Cybercrime-Friendly Forum Community – WhoisXML API Analysis
Exposing a Currently Active “Jabber ZeuS” also known as “Aqua ZeuS” Gang Personal Email Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Two – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Four – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious IPs Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious IPs Portfolio – Part Two – An OSINT Analysis
Exposing a Currently Active Cyber Jihad Domain Portfolio – An OSINT Analysis
Exposing a Currently Active Cyber Jihad Domains Portfolio – WhoisXML API Analysis
Exposing a Currently Active Domain Portfolio Belonging to Iran’s Mabna Hackers – An OSINT Analysis
Exposing a Currently Active Domain Portfolio Managed and Operated by Members of the Ashiyane Digital Security Team – WhoisXML API Analysis
Exposing a Currently Active Domain Portfolio of Currently Active High-Profile Cybercriminals Internationally – WhoisXML API Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – An OSINT Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – Part Two – An OSINT Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – Part Three – An OSINT Analysis
Exposing a Currently Active Domain Portfolio of Tech Support Scam Domains – An OSINT Analysis
Exposing a Currently Active Free Rogue VPN Domains Portfolio Courtesy of the NSA – WhoisXML API Analysis
Exposing a Currently Active Iran-Based Lone Hacker and Hacker Group’s Personal Web Sites Full Offline Copies – Direct Technical Collection Download – [RAR]
Exposing a Currently Active Kaseya Ransomware Domains Portfolio – WhoisXML API Analysis
Exposing a Currently Active Koobface Botnet C&C Server Domains Portfolio – Historical OSINT
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Two – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Three – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Two – An OSINT Analysis
Exposing a Currently Active Money Mule Recruitment Domain Registrant Portfolio – Historical OSINT
Exposing a Currently Active NSO Spyware Group’s Domain Portfolio – WhoisXML API Analysis
Exposing a Currently Active Portfolio of Personal Web Sites Belonging to Iran-Based Hackers and Hacking Teams and Groups – An OSINT Analysis
Exposing a Currently Active Portfolio of Personal Web Sites Belonging to Iran-Based Hackers and Hacking Teams and Groups – Part Two – An OSINT Analysis
Exposing a Currently Active Portfolio of Ransomware-Themed Protonmail Personal Email Address Accounts – An OSINT Analysis
Exposing a Currently Active Portfolio of RAT (Remote Access Tool) C&C Server IPs and Domains – An OSINT Analysis
Exposing a Currently Active Rock Phish Domain Portfolio – Historical OSINT
Exposing a Currently Active SolarWinds Rogue and Malicious C&C Domains Portfolio – An OSINT Analysis
Exposing a Currently Active WannaCry Ransomware Domains Portfolio – WhoisXML API Analysis
Exposing a Personal Photo Portfolio of Iran Hack Security Team – An OSINT Analysis
Exposing A Personal Photos Portfolio of Ashiyane Digital Security Group Team Members – An OSINT Analysis
Exposing a Personal Ransomware-Themed Email Address Portfolio – An OSINT Analysis
Exposing a Portfolio of Ashiyane Digital Security Team Hacking Tools – Direct Technical Collection Download – [RAR]
Exposing a Portfolio of Botnet Source Code – Direct Technical Collection Download – [RAR]
Exposing a Portfolio of Botnet Source Code – Part Two – Direct Technical Download – [RAR]
Exposing a Portfolio of Personal Photos of Iran-Based Hacker and Hacker Teams and Groups – An OSINT Analysis
Exposing a Portfolio of Web Malware Exploitation Kits – Direct Technical Collection Download -[RAR]
Exposing a Rogue Domain Portfolio of Fake News Sites – WhoisXML API Analysis
Exposing Bulgarian Cyber Army Hacking Group – An OSINT Analysis
Exposing HackPhreak Hacking Group – An OSINT Analysis
Exposing Personally Identifiable Information on Ashiyane Digital Security Group Team Members – An OSINT Analysis
Exposing Random Koobface Botnet Related Screenshots – An OSINT Analysis
Exposing Team Code Zero Hacking Group – An OSINT Analysis
From the “Definitely Busted” Department – A 2021 Compilation of Personally Identifiable Information on Various Cyber Threat Actors Internationally – An OSINT Analysis – [PDF]
Malware – Future Trends – Research Paper – 2006 Copy
Person on the U.S Secret Service Most Wanted Cybercriminals Identified Runs a Black Energy DDoS Botnet – WhoisXML API
Profiling a Currently Active CoolWebSearch Domains Portfolio – WhoisXML API Analysis
Profiling a Currently Active Domain Portfolio of Fake Job Proposition and Pharmaceutical Scam Domains – An OSINT Analysis
Profiling a Currently Active Domain Portfolio of Pay-Per-Install Rogue and Fraudulent Affiliate Network Domains – An OSINT Analysis
Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis
Profiling a Currently Active Personal Email Addresses Portfolio Operated by Cybercriminals Internationally – An OSINT Analysis
Profiling a Currently Active Portfolio of Rogue and Malicious Domains – An OSINT Analysis
Profiling a Currently Active Portfolio of Scareware and Malicious Domain Registrants – Historical OSINT
Profiling a Currently Active Portfolio of Scareware Domains – Historical OSINT
Profiling a Currently Active Portfolio of Spam Domains that Hit ZDNet.com Circa 2008 – An OSINT Analysis
Profiling a Currently Active Scareware Domains Portfolio – An OSINT Analysis
Profiling a Money Mule Recruitment Registrant Emails Portfolio – WhoisXML API Analysis
Profiling a Portfolio of Cybercriminal Email Addresses – WhoisXML API Analysis
Profiling a Portfolio of Personal Photos Courtesy of Koobface Botnet Master Anton Korotchenko – An OSINT Analysis
Profiling a Portfolio of Personal Photos of Behrooz Kamalian Team Member of Ashiyane Digital Security Team – An OSINT Analysis
Profiling a Portfolio of Personally Identifiable OSINT Artifacts from Law Enforcement and OSINT Operation “Uncle George” – An OSINT Analysis
Profiling a Rogue Fast-Flux Botnet Infrastructure Currently Hosting Multiple Online Cybercrime Enterprises – WhoisXML API Analysis
Profiling Iran’s Hacking Scene Using Maltego – A Practical Case Study and a Qualitative Approach – An Analysis
Profiling Russia’s U.S Election Interference 2016 – WhoisXML API Analysis
Profiling the “Jabber ZeuS” Rogue Botnet Enterprise – WhoisXML API Analysis
Profiling the Emotet Botnet C&C Infrastructure – An OSINT Analysis
Profiling the Internet Connected Infrastructure of the Individuals on the U.S Sanctions List – WhoisXML API Analysis
Profiling the Liberty Front Press Network Online – WhoisXML API Analysis
Profiling the U.S Election Interference 2016 – An OSINT Analysis
Security Researchers Targeted in Spear Phishing Campaign – WhoisXML API Analysis
Shots from the Wild West – Random Cybercrime Ecosystem Screenshots 2021 – An OSINT Analysis – Part Three
The Pareto Botnet – Advanced Cross-Platform Android Malware Using Amazon AWS Spotted in the Wild – WhoisXML API Analysis
Who’s Behind the Conficker Botnet? – WhoisXML API Analysis

Enjoy!

The price for membership is $175.00 now.

Membership expires after 3 Months.


Account Information Already have an account? Log in here

LEAVE THIS BLANK

Payment method

Bitcoin/Altcoin