Spaces:
Sleeping
Sleeping
Update README.md
Browse files
README.md
CHANGED
|
@@ -1,5 +1,5 @@
|
|
| 1 |
---
|
| 2 |
-
title: ShadowWatch
|
| 3 |
emoji: π‘οΈ
|
| 4 |
colorFrom: green
|
| 5 |
colorTo: gray
|
|
@@ -8,73 +8,85 @@ app_file: app.py
|
|
| 8 |
pinned: true
|
| 9 |
license: apache-2.0
|
| 10 |
tags:
|
| 11 |
-
- mcp
|
| 12 |
-
- security
|
| 13 |
-
-
|
| 14 |
-
-
|
| 15 |
-
-
|
| 16 |
-
short_description:
|
| 17 |
-
sdk_version: 6.4.0
|
| 18 |
---
|
| 19 |
|
| 20 |
-
# π‘οΈ SHADOWWATCH
|
| 21 |
|
| 22 |
-
**
|
| 23 |
|
| 24 |
-
|
| 25 |
|
| 26 |
-
##
|
| 27 |
|
| 28 |
| Tool | Description |
|
| 29 |
|------|-------------|
|
| 30 |
-
|
|
| 31 |
-
|
|
| 32 |
-
|
|
| 33 |
-
| `identity_alert` | Check for PII exposure and impersonation attempts |
|
| 34 |
-
| `generate_threat_report` | Create comprehensive threat intelligence reports |
|
| 35 |
|
| 36 |
-
##
|
| 37 |
|
| 38 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 39 |
|
| 40 |
```json
|
| 41 |
{
|
| 42 |
"mcpServers": {
|
| 43 |
"shadowwatch": {
|
| 44 |
-
"url": "https://crypticallyrequie-
|
| 45 |
}
|
| 46 |
}
|
| 47 |
}
|
| 48 |
```
|
| 49 |
|
| 50 |
-
|
| 51 |
|
| 52 |
```python
|
| 53 |
-
|
|
|
|
|
|
|
|
|
|
| 54 |
|
| 55 |
-
|
|
|
|
| 56 |
|
| 57 |
-
#
|
| 58 |
-
|
| 59 |
-
target="acme.com",
|
| 60 |
-
scan_type="comprehensive",
|
| 61 |
-
api_name="/deep_scan"
|
| 62 |
-
)
|
| 63 |
```
|
| 64 |
|
| 65 |
-
## π
|
| 66 |
|
| 67 |
-
- **
|
| 68 |
-
- **
|
| 69 |
-
- **
|
| 70 |
-
- **
|
| 71 |
-
- **
|
| 72 |
|
| 73 |
-
##
|
| 74 |
|
| 75 |
-
|
| 76 |
-
|
|
|
|
|
|
|
| 77 |
|
| 78 |
---
|
| 79 |
|
| 80 |
-
*Built by [Cogensec](https://cogensec.com)
|
|
|
|
| 1 |
---
|
| 2 |
+
title: ShadowWatch v2
|
| 3 |
emoji: π‘οΈ
|
| 4 |
colorFrom: green
|
| 5 |
colorTo: gray
|
|
|
|
| 8 |
pinned: true
|
| 9 |
license: apache-2.0
|
| 10 |
tags:
|
| 11 |
+
- mcp
|
| 12 |
+
- security
|
| 13 |
+
- threat-intelligence
|
| 14 |
+
- osint
|
| 15 |
+
- mcp-server
|
| 16 |
+
short_description: Open Source Threat Intelligence - No API Keys
|
|
|
|
| 17 |
---
|
| 18 |
|
| 19 |
+
# π‘οΈ SHADOWWATCH v2
|
| 20 |
|
| 21 |
+
**Open Source Threat Intelligence Platform | Cogensec ARGUS**
|
| 22 |
|
| 23 |
+
100% free threat intelligence using public feeds. No API keys required.
|
| 24 |
|
| 25 |
+
## β¨ Features
|
| 26 |
|
| 27 |
| Tool | Description |
|
| 28 |
|------|-------------|
|
| 29 |
+
| **Indicator Scanner** | Check IPs, domains, URLs against 7+ threat feeds |
|
| 30 |
+
| **IOC Extractor** | Extract & analyze IOCs from text, logs, reports |
|
| 31 |
+
| **Threat Feeds** | View loaded intelligence from all sources |
|
|
|
|
|
|
|
| 32 |
|
| 33 |
+
## π‘ Data Sources (All Free)
|
| 34 |
|
| 35 |
+
| Feed | Data Type | Provider |
|
| 36 |
+
|------|-----------|----------|
|
| 37 |
+
| **URLhaus** | Malicious URLs | abuse.ch |
|
| 38 |
+
| **ThreatFox** | IOCs (IPs, domains, hashes) | abuse.ch |
|
| 39 |
+
| **FeodoTracker** | Botnet C2 servers | abuse.ch |
|
| 40 |
+
| **MalwareBazaar** | Malware hashes | abuse.ch |
|
| 41 |
+
| **Spamhaus DROP** | Bad IP ranges | Spamhaus |
|
| 42 |
+
| **Emerging Threats** | Compromised IPs | ProofPoint |
|
| 43 |
+
| **OpenPhish** | Phishing URLs | OpenPhish |
|
| 44 |
+
| **HIBP Breaches** | Breach metadata | HIBP (public) |
|
| 45 |
+
|
| 46 |
+
## π MCP Integration
|
| 47 |
+
|
| 48 |
+
Connect to Claude, Cursor, or any MCP client:
|
| 49 |
|
| 50 |
```json
|
| 51 |
{
|
| 52 |
"mcpServers": {
|
| 53 |
"shadowwatch": {
|
| 54 |
+
"url": "https://crypticallyrequie-shadowwatchv2.hf.space/gradio_api/mcp/sse"
|
| 55 |
}
|
| 56 |
}
|
| 57 |
}
|
| 58 |
```
|
| 59 |
|
| 60 |
+
## π οΈ MCP Tools
|
| 61 |
|
| 62 |
```python
|
| 63 |
+
# Scan an indicator
|
| 64 |
+
scan_indicator("8.8.8.8", "ip")
|
| 65 |
+
scan_indicator("evil-domain.com", "domain")
|
| 66 |
+
scan_indicator("https://phishing.site/login", "url")
|
| 67 |
|
| 68 |
+
# Extract IOCs from text
|
| 69 |
+
extract_and_analyze_iocs("Found suspicious IP 192.168.1.1 connecting to malware.com...")
|
| 70 |
|
| 71 |
+
# Get feed statistics
|
| 72 |
+
get_threat_feed_stats()
|
|
|
|
|
|
|
|
|
|
|
|
|
| 73 |
```
|
| 74 |
|
| 75 |
+
## π Capabilities
|
| 76 |
|
| 77 |
+
- **Visual Dashboards** - Risk gauges, threat source charts, IOC distributions
|
| 78 |
+
- **Real Threat Data** - Live feeds from major threat intel providers
|
| 79 |
+
- **IOC Extraction** - Extract IPs, domains, URLs, hashes, emails, CVEs, Bitcoin addresses
|
| 80 |
+
- **Automatic Refresh** - Feeds update hourly
|
| 81 |
+
- **No Setup Required** - Works immediately, no API keys needed
|
| 82 |
|
| 83 |
+
## π How It Works
|
| 84 |
|
| 85 |
+
1. **Threat Feed Manager** downloads and caches public threat feeds
|
| 86 |
+
2. **Indicators are checked** against all loaded feeds
|
| 87 |
+
3. **Risk scores calculated** based on detections across sources
|
| 88 |
+
4. **Visual reports** generated with Plotly charts
|
| 89 |
|
| 90 |
---
|
| 91 |
|
| 92 |
+
*Built by [Cogensec](https://cogensec.com) | AI Security Platform*
|