Threat Analysis Platform - A Data collection and normalisation platform to keep with threat actors
  • Jupyter Notebook 45%
  • Python 31.4%
  • JavaScript 12.2%
  • HTML 7.5%
  • EJS 2%
  • Other 1.8%
Find a file
2025-05-15 15:24:05 +05:30
.github/workflows workflow improvements 2024-11-28 10:22:02 +05:30
admin Moved from grid API to grid2 API 2025-02-14 12:13:43 +05:30
api Code testing 2025-05-03 21:07:03 +05:30
container Final Touch 2025-05-11 20:49:17 +05:30
database Frontend Prisma integrations 2024-11-19 11:40:52 +05:30
docs API Docs 2025-04-17 17:20:26 +05:30
download Code testing 2025-05-03 21:07:03 +05:30
frontend Update Navbar.jsx 2025-05-15 15:24:05 +05:30
functions Update nulled_acc.py 2025-05-15 15:23:12 +05:30
images Added New image and data loader fixes 2025-03-13 01:47:06 +05:30
json added json folder 2025-03-04 00:46:30 +05:30
jupyter Better toast on script start 2024-11-26 15:39:27 +05:30
middleware Final Update 2025-02-09 18:53:25 +05:30
public Final Update 2025-02-09 18:53:25 +05:30
resource added new resources folder 2024-10-29 21:27:56 +05:30
video Rename video 2025-05-11 21:39:13 +05:30
.gitignore Moved from grid API to grid2 API 2025-02-14 12:13:43 +05:30
clean-api.sh Two tasks done 2025-03-04 00:37:31 +05:30
clean.sh Dark web Scrappers and Proxy complete 2024-10-30 17:12:24 +05:30
compose.yml Frontend Prisma integrations 2024-11-19 11:40:52 +05:30
data_loader.py Added New image and data loader fixes 2025-03-13 01:47:06 +05:30
Docs.md Two tasks done 2025-03-04 00:37:31 +05:30
go.mod Added the home and ransomware post page 2025-03-20 00:41:33 +05:30
go.sum Added the home and ransomware post page 2025-03-20 00:41:33 +05:30
LICENSE Create LICENSE 2024-09-11 15:15:09 +05:30
README.md Updated README 2025-05-13 11:29:43 +05:30
requirements.txt Code testing 2025-05-03 21:07:03 +05:30
SECURITY.md security.md 2024-09-11 15:16:59 +05:30
start.sh Started Work on final phase before main release 2025-03-18 12:29:49 +05:30
TODO.md Moved to new cracked site 2025-04-30 11:31:22 +05:30
wlc.sh Started Work on final phase before main release 2025-03-18 12:29:49 +05:30

Threat Analysis Platform (TAP)

GitLeaks License Version Build Status Docker Python Go Node.js NGINX PostgreSQL

TAP provides analyst access to multiple cyber crime forums in a single TAP allowing them to streamline their threat intelligence and data collection capabities, TAP provides access to multiple cyber crime forums, ransomware gang sites over TOR, doxxing and hate platforms in form search API's and scraped data that be can used to quickly form correlation between different threat actor movements and discussions.

A comprehensive cybersecurity intelligence platform that aggregates, analyzes, and provides searchable access to data from various sources including dark web forums, breach databases, and ransomware posts.

Note The documentation of this project is still under work and will be updated accordingly

Overview

TAP is designed to help security professionals monitor and analyze cyber threats by collecting and indexing data from multiple sources:

  • Breach database leaks
  • Doxbin records
  • Nulled forum data
  • OnniForums intelligence
  • Cracked accounts and combos
  • Ransomware group activities
  • IOC (Indicators of Compromise) checking
  • IP reputation analysis
  • File hash verification

The platform provides both a web interface for interactive searches and API endpoints for integration with other security tools.

Architecture

The system consists of multiple components:

  • Frontend: React-based UI with Tailwind CSS and Material UI
  • Admin Panel: Management interface for system administration
  • APIs: Python and Go services for data retrieval and processing
  • Container: Dockerized environment for dark web scraping
  • Database: PostgreSQL database for storing indexed data
  • Data Loaders: Scripts to collect and process data
  • NGINX: Reverse proxy for routing traffic to different services
  • Docker: Containerization for easy deployment and scaling

System Architecture

System Design

Dataset

You can download the data that has already been scraped by the platform at kaggle.com/snowkluster

Getting Started

Prerequisites

  • Docker and Docker Compose
  • Node.js 22+
  • Python 3.11+
  • Go 1.21+

Installation

  1. Clone the repository:

    git clone https://github.com/snowkluster/TAP.git
    cd TAP
    
  2. Start dashboard frontend:

    cd frontend
    npm install
    npm run dev
    
  3. Start admin panel [frontend]:

    cd admin/frontend
    npm install
    npm run dev
    
  4. Start admin panel [backend]:

    cd admin/backend
    npm install
    node app.js
    
  5. Start API:

    pip install -r requirements.txt
    cd api
    ./build.sh
    ./starter.sh
    
  6. Start the platform using Docker Compose:

    ./start.sh
    
  7. Access the services:

Docker Configuration

The project uses Docker Compose to orchestrate multiple services:

  • NGINX: Reverse proxy for routing traffic
  • PostgreSQL: Database for storing collected data
  • SQLite: Database for backup storage incase of failure of PSQL Database

The compose.yml file defines these services and their configurations.

Networking

The platform uses two networking approaches:

  • Host Network: For the NGINX service, allowing direct access to localhost services
  • Bridge Network: For the database and other services, providing container isolation

Development Setup

For frontend development:

cd frontend
npm install
npm run dev

For admin panel development [frontend]:

cd admin/frontend
npm install
npm run dev

For admin panel development [backend]:

cd admin/backend
npm install
node app.js

For API development:

cd api
./build.sh
./starter.sh

Features

  • Live Search: Query across multiple data sources
  • Breach Search: Find compromised credentials
  • Darknet Feed: Monitor latest dark web activities
  • Ransomware Post Tracking: Stay updated on ransomware group activities
  • IP & Hash Analysis: Check reputation and malware indicators
  • Cybersecurity News: Latest updates from the security community

API Documentation

The platform provides several API endpoints:

  • :8010/search/": Search breached forums for records
  • :8002/search/: Search doxbin forums for records
  • :8013/search/: Search nulled forums for records
  • :8014/search/: Search OnniForums forums for records
  • 8004:/check_ip/?ip=:<IP_ADDR>: Check IP reputation
  • 8006:/check/:<FILE_HASH>: Verify file hashes and reputation
  • 8009:/scrape/: Get latest ransomware posts
  • :8008/: Check indicators of compromise

For further details look at API Docs

Server Configuration

NGINX

The platform uses NGINX as a reverse proxy to route traffic to different services:

  • portal.localhost routes to the main frontend application
  • dashboard.localhost routes to the admin dashboard

The NGINX configuration is stored in public/nginx.conf and is mounted into the NGINX container.

Database

PostgreSQL is used as the primary database with the following configuration:

  • Username: dbuser
  • Database: darkweb
  • Port: 5432

Data persistence is managed via Docker volumes.

Maintenance

Cleaning Scripts

The repository includes several utility scripts:

  • clean.sh: General cleanup
  • clean-api.sh: API-specific cleanup
  • wlc.sh: Welcome script

Security

This platform is designed for legitimate security research and threat intelligence purposes only. See SECURITY.md for security policies and responsible usage guidelines.

Contributing

Contributions are welcome! Please check the TODO.md file for areas that need help. Follow these steps:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add some amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

License

This project is licensed under the MIT License - see the LICENSE file for details.

Authors