DOGE : Darknet Osint Graph Explorer

DOGE is a darknet Osint Graph Explorer, which is still in the development stage and you should use this in addtion to Darknet OSINT Transform.

Query prototype: SELECT DISTINCT custom_column_name AS input, another_custom_name AS output FROM some_table, obviously you can add other options as WHERE, ORDER BY, etc.

Also Read – Metaforge : An OSINT Metadata Analysing Tool that Filters Through Tags & Creates Reports

How-To

  • Database file: the filename of the database (sqlite3), ex: db.sqlite3
  • Graph file: useless (now as now)
  • Icon From: the type of the “from” entity (email -> domain, email is “from”, domain is “to”), so the same as Icon To
  • Center to node: put node id here, then click on Center Graph to center the graph to that specific node id
  • Query: write here the query that you’ll use to retrieve data from the database, follow the prototype above
  • Load Data: add data but don’t draw, you could use this to import stuff from various databases and when everyting is imported, draw
  • Draw Graph: draws nodes with edges
  • Import Graph: useless (now as now)
  • Export Graph: useless (now as now)
  • Prerender: does not display the graph until the “pre-rendering” process is done, this should be used when you have to graph 100s of nodes, feel free to change parameters:
    • 1st argument, precomputeGraph(), in pages/graph_1.html;
    • in the same file, lines 246 and 247.

Custom icons

Every icon comes from Font Awesome, I just changed colors.

Screenshot

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

15 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

15 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

15 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

15 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

15 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

18 hours ago