I’ve seen multiple projects out there in GitHub, that are crawlers for the deep web, but most of them did not meet my standards of OSINT on the deep web.
So I decided to create my own deep web OSINT tool.
This tool serves as a reminder that the best practices of OPSEC should always be followed in the deep web.
The author of this project is not responsible for any possible harm caused by the usage of this tool.
Prying Deep crawls dark/clear net platforms and extracts as much intelligence as possible effectively.
Before you can use our OSINT tool, please ensure you have the following dependencies installed:
pryingdeep.yaml
environment variables match the environment in docker-compose.yaml
go install -v github.com/iudicium/pryingdeep/cmd/pryingdeep@latest
2. Run the following command:
pryingdeep install
For more information click here.
For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and…
For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and…
For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and…
For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and…
HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision…
RedFlag leverages AI to determine high-risk code changes. Run it in batch mode to scope…