DOGE is a darknet Osint Graph Explorer, which is still in the development stage and you should use this in addtion to Darknet OSINT Transform.
Query prototype: SELECT DISTINCT custom_column_name AS input, another_custom_name AS output FROM some_table, obviously you can add other options as WHERE, ORDER BY, etc.
Also Read – Metaforge : An OSINT Metadata Analysing Tool that Filters Through Tags & Creates Reports
How-To
Database file
: the filename of the database (sqlite3), ex: db.sqlite3Graph file
: useless (now as now)Icon From
: the type of the “from” entity (email -> domain, email is “from”, domain is “to”), so the same as Icon To
Center to node
: put node id here, then click on Center Graph
to center the graph to that specific node idQuery
: write here the query that you’ll use to retrieve data from the database, follow the prototype aboveLoad Data
: add data but don’t draw, you could use this to import stuff from various databases and when everyting is imported, drawDraw Graph
: draws nodes with edgesImport Graph
: useless (now as now)Export Graph
: useless (now as now)Prerender
: does not display the graph until the “pre-rendering” process is done, this should be used when you have to graph 100s of nodes, feel free to change parameters:precomputeGraph()
, in pages/graph_1.html
;Custom icons
Every icon comes from Font Awesome, I just changed colors.
Screenshot
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…