Liberty91LTD/cti-skills

GitHub: Liberty91LTD/cti-skills

一套面向CTI生命周期的技能库与编排器,解决威胁情报从采集到生产的一致性与自动化问题。

Stars: 0 | Forks: 0

# cti-skills Cyber Threat Intelligence skills for Claude Code and AI agents. Threat actor profiling, IOC investigation, OSINT methodology, detection engineering (SIGMA/YARA/KQL), intelligence writing, and self-updating knowledge cells on nation-state and cybercrime threats. Built by [Liberty91 Ltd](https://liberty91.com). MIT-licensed. Works in Claude Code, Cursor, Codex, Windsurf — any agentic IDE that supports [Agent Skills](https://agentskills.io/specification). ## What's in the pack - **52 skills** covering analytical tradecraft, CTI methodology, detection engineering, intelligence production, and living knowledge cells on China, Russia, Iran, DPRK cyber espionage, ransomware, infostealers, initial access brokers, and more. - **7 threat-intel integrations** — VirusTotal, URLScan.io, Shodan, AbuseIPDB, GreyNoise, AlienVault OTX, Censys. Each exposed as a lookup skill any other skill can chain. - **Local MITRE ATT&CK dataset** — TTP mapping without network calls. - **Tradecraft vocabularies** — TLP, NATO Admiralty Scale, MISP confidence, probability yardstick. Auto-applied by the orchestrator; also invokable directly. - **A single orchestrator skill** that routes requests and auto-applies rigor to every output. ## Install Pick whichever works for your stack. ### Claude Code plugin (recommended) ``` /plugin marketplace add Liberty91LTD/cti-skills /plugin install cti-skills ``` ### npx (one-shot, no global install) ``` # in any project directory npx github:Liberty91LTD/cti-skills ``` Copies all 64 skills + tool integrations + plugin manifest into the current directory. Use `--target ` to install elsewhere, or `npx github:Liberty91LTD/cti-skills list` to browse skills first. ### Git clone ``` git clone git@github.com:Liberty91LTD/cti-skills.git cd cti-skills ./scripts/setup.sh # prompts for optional API keys + downloads MITRE data claude ``` ### Git submodule (for embedding in an existing repo) ``` git submodule add https://github.com/Liberty91LTD/cti-skills.git skills/cti ``` ### Fork Hit "Fork" on GitHub, then install via plugin or clone from your fork. ### Direct copy Copy the `skills/` directory into your own project. Each skill is self-contained. ### Cursor, Codex, Windsurf, other Agent Skills-compatible IDEs Clone the repo into your agent skills directory per your IDE's documentation. The orchestrator is itself a skill — no Claude-specific subagent required. ## Try it Once installed: ``` Investigate 203.0.113.42 ``` The orchestrator routes this to `/ip-investigation`, which chains `/lookup-virustotal` + `/lookup-otx` + `/lookup-shodan` + `/lookup-abuseipdb` + `/lookup-greynoise`, scores sources, applies TLP, and returns a rated investigation report. ``` Profile APT28 ``` Routes to `/threat-actor-profile` — produces an actor card with aliases, targeting, TTPs, attribution confidence. ``` /ach ``` Direct-invoke Analysis of Competing Hypotheses. ``` /iran-cyber-espionage ``` Load the Iran knowledge cell. ``` /pir-management ``` Set up Priority Intelligence Requirements. ## Pick a skill Skills are organized flat (in Phase C) but currently grouped. Browse: - **Investigation** — `/ip-investigation`, `/domain-investigation`, `/hash-investigation`, `/url-investigation` *(coming in Phase C)* - **Analysis** — `/threat-actor-profile`, `/ach`, `/indicator-pivoting`, `/campaign-tracking`, `/malware-analysis`, `/threat-assessment`, `/horizon-scanning`, `/key-assumptions-check`, `/red-team-analysis`, `/structured-analytic-techniques` - **Tradecraft rigor** — `/apply-tlp`, `/score-source`, `/confidence-language` *(currently `confidence-levels`)*, `/likelihood-language` - **Production** — `/intelligence-writing`, `/writing-assessments`, `/quality-control`, `/ioc-export`, `/stix-bundle`, `/ioc-enrichment-workflow` - **Detection engineering** — `/sigma-writing`, `/yara-writing`, `/kql-writing` - **Knowledge cells** — `/china-cyber-espionage`, `/russia-cyber-espionage`, `/iran-cyber-espionage`, `/dprk-cyber-espionage`, `/ransomware-ecosystem`, `/infostealers`, `/initial-access-brokers`, `/phishing-social-engineering`, `/supply-chain-threats`, `/carding-financial-fraud`, `/hacktivism` - **OSINT + collection** — `/osint-methodology`, `/darkweb-collection`, `/vulnerability-intelligence` - **Lookups** — `/lookup-virustotal`, `/lookup-otx`, `/lookup-urlscan`, `/lookup-shodan`, `/lookup-abuseipdb`, `/lookup-greynoise`, `/lookup-censys`, `/mitre-attack` *(coming in Phase B)* - **Management** — `/pir-management`, `/stakeholder-management`, `/feedback-loops`, `/sops`, `/maturity-assessment`, `/intelligence-sharing`, `/quality-control` - **Methodology** — `/cti-hyperloop` (optional operating doctrine) ## API keys Optional. The pack degrades gracefully — skills skip enrichments for which no key is configured. | Service | Env variable | Free tier | |---|---|---| | VirusTotal | `VIRUSTOTAL_API_KEY` | 4 req/min, 500/day | | URLScan.io | `URLSCAN_API_KEY` | 100 scans/day | | Shodan | `SHODAN_API_KEY` | 1 req/sec | | AbuseIPDB | `ABUSEIPDB_API_KEY` | 1000 checks/day | | GreyNoise | `GREYNOISE_API_KEY` | 50 req/day | | AlienVault OTX | `OTX_API_KEY` | 10,000 req/hour | | Censys | `CENSYS_API_ID` + `CENSYS_API_SECRET` | 250 queries/month | `./scripts/setup.sh` walks you through configuration. Keys land in `.claude/settings.local.json` (gitignored). Environment variables work too. ## Status Version 1.0.0 — see [VERSIONS.md](VERSIONS.md) for per-skill versions and changelog. Active restructure: this repo is transitioning from a 14-agent hierarchical architecture to a flat-skill + single-orchestrator model. Some invocations listed above (the `lookup-*` skills, investigation skills) ship in Phase B/C. ## License MIT — see [LICENSE](LICENSE). ## About Liberty91 [Liberty91 Ltd](https://liberty91.com) builds AI-native threat intelligence tooling. Contact: contact@liberty91.com.
标签:AbuseIPDB, Agent技能, AI代理, Ask搜索, Claude Code, Cloudflare, CTI生命周期, Git克隆, GreyNoise, IOC调查, KQL, MISP置信度, MITRE ATT&CK, NATO海军等级, npx安装, OSINT方法论, SIGMA, TLP, TTP映射, URLScan.io, VirusTotal, YARA, 云资产可视化, 国家威胁, 威胁情报集成, 威胁行为体画像, 子模块嵌入, 情报撰写, 技能包, 插件安装, 无网络调用, 本地数据集, 概率标杆, 知识细胞, 管理员页面发现, 编排器, 网络威胁情报, 网络犯罪威胁, 自定义脚本, 逆向工具