Dancho Danchev's Substack Special Christmas Discount - Subscribe Today!
Anyone interested in helping me fund my research which will greatly help me fuel growth into my research and motivate me to produce high-quality research and analysis on a daily basis at Substack?
Dear Substack readers,
This is Dancho,
I wanted to let everyone know that I’ve finally moved away from one of the security industry’s most popular security publications since December, 2005 which is my original personal blog (https://ddanchev.blogspot.com) where I did my best to migrate most of the content which I’ve been publishing there throughout the years at Substack including a full offline copy in multiple E-Book readers format which is available online for free here.
Here are the discount details:
I can guarantee content in the following categories on a daily basis where I can guarantee up to 12-21 posts on a daily basis including one weekly podcast session including the following sample content and research which is available exclusively to Premium Subscribers only:
A Compilation of Currently Active 419 and Related Scams Scammer Email Addresses – An OSINT Analysis
A Compilation of Currently Active Cyber Jihad Themed Personal Email Addresses – An OSINT Analysis
A Compilation of Currently Active Full Offline Copies of Cybercrime-Friendly Forum Communities – Direct Technical Collection Download -[RAR]
Advanced Bulletproof Malicious Infrastructure Investigation – WhoisXML API Analysis
Advanced Mapping and Reconnaissance of Botnet Command and Control Infrastructure using Hostinger’s Legitimate Infrastructure – WhoisXML API Analysis
Advanced Mapping and Reconnaissance of the Emotet Botnet – WhoisXML API Analysis
Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran – Free Research Report
Astalavista Security Newsletter – 2003-2006 – Full Offline Reading Copy
Compilations of Personally Identifiable Information Including XMPP/Jabber and Personal Emails Belonging to Cybercriminals and Malicious Threat Actors Internationally – An OSINT Analysis
Cyber Intelligence – Personal Memoir – Dancho Danchev – 2021 – Download Free Copy Today!
Cybercriminals Impersonate Legitimate Security Researcher Launch a Typosquatting C&C Server Campaign – WhoisXML API Analysis
Dancho Danchev – Cyber Intelligence – Personal Memoir – Direct Download Copy Available
Dancho Danchev’s “A Qualitative and Technical Collection OSINT-Enriched Analysis of the Iranian Hacking Scene Through the Prism of the Infamous Ashiyane Digital Security Team” Report – [PDF]
Dancho Danchev’s “Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran” Report – [PDF]
Dancho Danchev’s “Building and Implementing a Successful Information Security Policy” White Paper – [PDF]
Dancho Danchev’s “Cyber Jihad vs Cyberterrorim – Separating Hype from Reality” Presentation – [PDF]
Dancho Danchev’s “Exposing Koobface – The World’s Largest Botnet” Presentation – [PDF]Dancho Danchev’s “Exposing the Dynamic Money Mule Recruitment Ecosystem” Presentation – [PDF]
Dancho Danchev’s “Intell on the Criminal Underground – Who’s Who in Cybercrime for 2007” Presentation – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 01 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 02 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 03 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 04 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 05 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 06 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 07 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 08 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 09 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 10 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 11 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 12 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 13 – [PDF]
Dancho Danchev’s Blog – Full Offline Copy Available – Volume 14 – [PDF]
Dancho Danchev’s Comeback Livestream Today – Join me on Facebook Live!
Dancho Danchev’s Privacy and Security Research Compilation – Medium Account Research Compilation – [PDF]
Dancho Danchev’s Research for Unit-123.org – Direct Download Copy Available
Dancho Danchev’s Research for Webroot – Direct Download Copy Available
Dancho Danchev’s Security Articles and Research for ZDNet’s Zero Day Blog – Full Offline Copy Available – [PDF]
Dancho Danchev’s Security/OSINT/Cybercrime Research and Threat Intelligence Gathering Research Compilations – [PDF]
Dancho Danchev’s Twitter Archive – Direct Download – [ZIP]
Exposing 29A Virus Coding Group – An OSINT Analysis
Exposing a Botnet/Crypters and RATs (Remote Access Tools) Source Code Portfolio – Direct Technical Download – [RAR]
Exposing a Boutique Fraudulent and Rogue Cybercrime-Friendly Forum Community – WhoisXML API Analysis
Exposing a Currently Active “Jabber ZeuS” also known as “Aqua ZeuS” Gang Personal Email Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Two – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Four – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious IPs Portfolio – An OSINT Analysis
Exposing a Currently Active CoolWebSearch Rogue and Malicious IPs Portfolio – Part Two – An OSINT Analysis
Exposing a Currently Active Cyber Jihad Domain Portfolio – An OSINT Analysis
Exposing a Currently Active Cyber Jihad Domains Portfolio – WhoisXML API Analysis
Exposing a Currently Active Domain Portfolio Belonging to Iran’s Mabna Hackers – An OSINT Analysis
Exposing a Currently Active Domain Portfolio Managed and Operated by Members of the Ashiyane Digital Security Team – WhoisXML API Analysis
Exposing a Currently Active Domain Portfolio of Currently Active High-Profile Cybercriminals Internationally – WhoisXML API Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – An OSINT Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – Part Two – An OSINT Analysis
Exposing A Currently Active Domain Portfolio of Cybercrime Friendly Forum Communities – Part Three – An OSINT Analysis
Exposing a Currently Active Domain Portfolio of Tech Support Scam Domains – An OSINT Analysis
Exposing a Currently Active Free Rogue VPN Domains Portfolio Courtesy of the NSA – WhoisXML API Analysis
Exposing a Currently Active Iran-Based Lone Hacker and Hacker Group’s Personal Web Sites Full Offline Copies – Direct Technical Collection Download – [RAR]
Exposing a Currently Active Kaseya Ransomware Domains Portfolio – WhoisXML API Analysis
Exposing a Currently Active Koobface Botnet C&C Server Domains Portfolio – Historical OSINT
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Two – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Three – An OSINT Analysis
Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – Part Two – An OSINT Analysis
Exposing a Currently Active Money Mule Recruitment Domain Registrant Portfolio – Historical OSINT
Exposing a Currently Active NSO Spyware Group’s Domain Portfolio – WhoisXML API Analysis
Exposing a Currently Active Portfolio of Personal Web Sites Belonging to Iran-Based Hackers and Hacking Teams and Groups – An OSINT Analysis
Exposing a Currently Active Portfolio of Personal Web Sites Belonging to Iran-Based Hackers and Hacking Teams and Groups – Part Two – An OSINT Analysis
Exposing a Currently Active Portfolio of Ransomware-Themed Protonmail Personal Email Address Accounts – An OSINT Analysis
Exposing a Currently Active Portfolio of RAT (Remote Access Tool) C&C Server IPs and Domains – An OSINT Analysis
Exposing a Currently Active Rock Phish Domain Portfolio – Historical OSINT
Exposing a Currently Active SolarWinds Rogue and Malicious C&C Domains Portfolio – An OSINT Analysis
Exposing a Currently Active WannaCry Ransomware Domains Portfolio – WhoisXML API Analysis
Exposing a Personal Photo Portfolio of Iran Hack Security Team – An OSINT Analysis
Exposing A Personal Photos Portfolio of Ashiyane Digital Security Group Team Members – An OSINT Analysis
Exposing a Personal Ransomware-Themed Email Address Portfolio – An OSINT Analysis
Exposing a Portfolio of Ashiyane Digital Security Team Hacking Tools – Direct Technical Collection Download – [RAR]
Exposing a Portfolio of Botnet Source Code – Direct Technical Collection Download – [RAR]
Exposing a Portfolio of Botnet Source Code – Part Two – Direct Technical Download – [RAR]
Exposing a Portfolio of Personal Photos of Iran-Based Hacker and Hacker Teams and Groups – An OSINT Analysis
Exposing a Portfolio of Web Malware Exploitation Kits – Direct Technical Collection Download -[RAR]
Exposing a Rogue Domain Portfolio of Fake News Sites – WhoisXML API Analysis
Exposing Bulgarian Cyber Army Hacking Group – An OSINT Analysis
Exposing HackPhreak Hacking Group – An OSINT Analysis
Exposing Personally Identifiable Information on Ashiyane Digital Security Group Team Members – An OSINT Analysis
Exposing Random Koobface Botnet Related Screenshots – An OSINT Analysis
Exposing Team Code Zero Hacking Group – An OSINT Analysis
From the “Definitely Busted” Department – A 2021 Compilation of Personally Identifiable Information on Various Cyber Threat Actors Internationally – An OSINT Analysis – [PDF]
Malware – Future Trends – Research Paper – 2006 Copy
Person on the U.S Secret Service Most Wanted Cybercriminals Identified Runs a Black Energy DDoS Botnet – WhoisXML API
Profiling a Currently Active CoolWebSearch Domains Portfolio – WhoisXML API Analysis
Profiling a Currently Active Domain Portfolio of Fake Job Proposition and Pharmaceutical Scam Domains – An OSINT Analysis
Profiling a Currently Active Domain Portfolio of Pay-Per-Install Rogue and Fraudulent Affiliate Network Domains – An OSINT Analysis
Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis
Profiling a Currently Active Personal Email Addresses Portfolio Operated by Cybercriminals Internationally – An OSINT Analysis
Profiling a Currently Active Portfolio of Rogue and Malicious Domains – An OSINT Analysis
Profiling a Currently Active Portfolio of Scareware and Malicious Domain Registrants – Historical OSINT
Profiling a Currently Active Portfolio of Scareware Domains – Historical OSINT
Profiling a Currently Active Portfolio of Spam Domains that Hit ZDNet.com Circa 2008 – An OSINT Analysis
Profiling a Currently Active Scareware Domains Portfolio – An OSINT Analysis
Profiling a Money Mule Recruitment Registrant Emails Portfolio – WhoisXML API Analysis
Profiling a Portfolio of Cybercriminal Email Addresses – WhoisXML API Analysis
Profiling a Portfolio of Personal Photos Courtesy of Koobface Botnet Master Anton Korotchenko – An OSINT Analysis
Profiling a Portfolio of Personal Photos of Behrooz Kamalian Team Member of Ashiyane Digital Security Team – An OSINT Analysis
Profiling a Portfolio of Personally Identifiable OSINT Artifacts from Law Enforcement and OSINT Operation “Uncle George” – An OSINT Analysis
Profiling a Rogue Fast-Flux Botnet Infrastructure Currently Hosting Multiple Online Cybercrime Enterprises – WhoisXML API Analysis
Profiling Iran’s Hacking Scene Using Maltego – A Practical Case Study and a Qualitative Approach – An Analysis
Profiling Russia’s U.S Election Interference 2016 – WhoisXML API Analysis
Profiling the “Jabber ZeuS” Rogue Botnet Enterprise – WhoisXML API Analysis
Profiling the Emotet Botnet C&C Infrastructure – An OSINT Analysis
Profiling the Internet Connected Infrastructure of the Individuals on the U.S Sanctions List – WhoisXML API Analysis
Profiling the Liberty Front Press Network Online – WhoisXML API Analysis
Profiling the U.S Election Interference 2016 – An OSINT Analysis
Security Researchers Targeted in Spear Phishing Campaign – WhoisXML API AnalysisShots from the Wild West – Random Cybercrime Ecosystem Screenshots 2021 – An OSINT Analysis – Part Three
The Pareto Botnet – Advanced Cross-Platform Android Malware Using Amazon AWS Spotted in the Wild – WhoisXML API Analysis
Who’s Behind the Conficker Botnet? – WhoisXML API Analysis
Stay tuned!