Thanks for checking out the ThreatPipes Starter Edition.
ThreatPipes is a reconnaissance tool that automatically queries 100’s of data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more.
You simply specify the target you want to investigate, pick which modules to enable and then ThreatPipes will collect data to build up an understanding of all the entities and how they relate to each other.
DNS, Whois, Web pages, passive DNS, spam blacklists, file meta data, threat intelligence lists as well as services like SHODAN, HaveIBeenPwned? and more are used to find out more about a target and known affiliates.
The data returned from a ThreatPipes scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, red team exercise or for threat intelligence.
The pages in this documentation cover everything from installing to troubleshooting issues with ThreatPipes.
Admin Guide: Start here if you need to install ThreatPipes.
User Guide: Familiarise yourself with ThreatPipes features and how to use them.
Developer Guide: Customise and extend the power of ThreatPipes.
Release Notes: Learn about what's new in our most recent release.