CrypticallyRequie commited on
Commit
dc302ac
Β·
verified Β·
1 Parent(s): 56921f3

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +51 -39
README.md CHANGED
@@ -1,5 +1,5 @@
1
  ---
2
- title: ShadowWatch
3
  emoji: πŸ›‘οΈ
4
  colorFrom: green
5
  colorTo: gray
@@ -8,73 +8,85 @@ app_file: app.py
8
  pinned: true
9
  license: apache-2.0
10
  tags:
11
- - mcp
12
- - security
13
- - dark-web
14
- - threat-intelligence
15
- - osint
16
- short_description: Dark Web Intelligence Platform with MCP Tools
17
- sdk_version: 6.4.0
18
  ---
19
 
20
- # πŸ›‘οΈ SHADOWWATCH
21
 
22
- **Dark Web Intelligence Platform | Cogensec ARGUS**
23
 
24
- Real-time dark web monitoring and threat intelligence for security operations. MCP-enabled tools for integration with AI assistants.
25
 
26
- ## πŸ”§ MCP Tools
27
 
28
  | Tool | Description |
29
  |------|-------------|
30
- | `deep_scan` | Crawl marketplaces, forums, and paste sites for threat intelligence |
31
- | `credential_trace` | Search breach databases for credential exposure |
32
- | `chatter_analysis` | Monitor dark web discussions for specific keywords |
33
- | `identity_alert` | Check for PII exposure and impersonation attempts |
34
- | `generate_threat_report` | Create comprehensive threat intelligence reports |
35
 
36
- ## πŸ”— Integration
37
 
38
- ### Connect to Claude Desktop, Cursor, or any MCP Client
 
 
 
 
 
 
 
 
 
 
 
 
 
39
 
40
  ```json
41
  {
42
  "mcpServers": {
43
  "shadowwatch": {
44
- "url": "https://crypticallyrequie-shadowwatch.hf.space/gradio_api/mcp/sse"
45
  }
46
  }
47
  }
48
  ```
49
 
50
- ### Python Client
51
 
52
  ```python
53
- from gradio_client import Client
 
 
 
54
 
55
- client = Client("CrypticallyRequie/shadowwatch")
 
56
 
57
- # Deep scan for threats
58
- result = client.predict(
59
- target="acme.com",
60
- scan_type="comprehensive",
61
- api_name="/deep_scan"
62
- )
63
  ```
64
 
65
- ## πŸ“Š Features
66
 
67
- - **Dark Web Scanning** - 50+ marketplaces, forums, and channels
68
- - **Credential Monitoring** - Known breach databases and combolists
69
- - **Chatter Analysis** - Real-time mention tracking with sentiment
70
- - **Identity Protection** - PII exposure and impersonation detection
71
- - **Threat Reports** - Executive and technical intelligence reports
72
 
73
- ## πŸ—οΈ Built With
74
 
75
- - [Gradio](https://gradio.app) - Interface & MCP Server
76
- - [Cogensec CASF](https://cogensec.com) - AI Security Framework
 
 
77
 
78
  ---
79
 
80
- *Built by [Cogensec](https://cogensec.com) - Protecting organizations from dark web threats*
 
1
  ---
2
+ title: ShadowWatch v2
3
  emoji: πŸ›‘οΈ
4
  colorFrom: green
5
  colorTo: gray
 
8
  pinned: true
9
  license: apache-2.0
10
  tags:
11
+ - mcp
12
+ - security
13
+ - threat-intelligence
14
+ - osint
15
+ - mcp-server
16
+ short_description: Open Source Threat Intelligence - No API Keys
 
17
  ---
18
 
19
+ # πŸ›‘οΈ SHADOWWATCH v2
20
 
21
+ **Open Source Threat Intelligence Platform | Cogensec ARGUS**
22
 
23
+ 100% free threat intelligence using public feeds. No API keys required.
24
 
25
+ ## ✨ Features
26
 
27
  | Tool | Description |
28
  |------|-------------|
29
+ | **Indicator Scanner** | Check IPs, domains, URLs against 7+ threat feeds |
30
+ | **IOC Extractor** | Extract & analyze IOCs from text, logs, reports |
31
+ | **Threat Feeds** | View loaded intelligence from all sources |
 
 
32
 
33
+ ## πŸ“‘ Data Sources (All Free)
34
 
35
+ | Feed | Data Type | Provider |
36
+ |------|-----------|----------|
37
+ | **URLhaus** | Malicious URLs | abuse.ch |
38
+ | **ThreatFox** | IOCs (IPs, domains, hashes) | abuse.ch |
39
+ | **FeodoTracker** | Botnet C2 servers | abuse.ch |
40
+ | **MalwareBazaar** | Malware hashes | abuse.ch |
41
+ | **Spamhaus DROP** | Bad IP ranges | Spamhaus |
42
+ | **Emerging Threats** | Compromised IPs | ProofPoint |
43
+ | **OpenPhish** | Phishing URLs | OpenPhish |
44
+ | **HIBP Breaches** | Breach metadata | HIBP (public) |
45
+
46
+ ## πŸ”— MCP Integration
47
+
48
+ Connect to Claude, Cursor, or any MCP client:
49
 
50
  ```json
51
  {
52
  "mcpServers": {
53
  "shadowwatch": {
54
+ "url": "https://crypticallyrequie-shadowwatchv2.hf.space/gradio_api/mcp/sse"
55
  }
56
  }
57
  }
58
  ```
59
 
60
+ ## πŸ› οΈ MCP Tools
61
 
62
  ```python
63
+ # Scan an indicator
64
+ scan_indicator("8.8.8.8", "ip")
65
+ scan_indicator("evil-domain.com", "domain")
66
+ scan_indicator("https://phishing.site/login", "url")
67
 
68
+ # Extract IOCs from text
69
+ extract_and_analyze_iocs("Found suspicious IP 192.168.1.1 connecting to malware.com...")
70
 
71
+ # Get feed statistics
72
+ get_threat_feed_stats()
 
 
 
 
73
  ```
74
 
75
+ ## πŸ“Š Capabilities
76
 
77
+ - **Visual Dashboards** - Risk gauges, threat source charts, IOC distributions
78
+ - **Real Threat Data** - Live feeds from major threat intel providers
79
+ - **IOC Extraction** - Extract IPs, domains, URLs, hashes, emails, CVEs, Bitcoin addresses
80
+ - **Automatic Refresh** - Feeds update hourly
81
+ - **No Setup Required** - Works immediately, no API keys needed
82
 
83
+ ## πŸ”’ How It Works
84
 
85
+ 1. **Threat Feed Manager** downloads and caches public threat feeds
86
+ 2. **Indicators are checked** against all loaded feeds
87
+ 3. **Risk scores calculated** based on detections across sources
88
+ 4. **Visual reports** generated with Plotly charts
89
 
90
  ---
91
 
92
+ *Built by [Cogensec](https://cogensec.com) | AI Security Platform*