TAP provides analyst access to multiple cyber crime forums in a single TAP allowing them to streamline their threat intelligence and data collection capabities, TAP provides access to multiple cyber crime forums, ransomware gang sites over TOR, doxxing and hate platforms in form search API's and scraped data that be can used to quickly form correlation between different threat actor movements and discussions.
A comprehensive cybersecurity intelligence platform that aggregates, analyzes, and provides searchable access to data from various sources including dark web forums, breach databases, and ransomware posts.
Note The documentation of this project is still under work and will be updated accordingly
TAP is designed to help security professionals monitor and analyze cyber threats by collecting and indexing data from multiple sources:
- Breach database leaks
- Doxbin records
- Nulled forum data
- OnniForums intelligence
- Cracked accounts and combos
- Ransomware group activities
- IOC (Indicators of Compromise) checking
- IP reputation analysis
- File hash verification
The platform provides both a web interface for interactive searches and API endpoints for integration with other security tools.
The system consists of multiple components:
- Frontend: React-based UI with Tailwind CSS and Material UI
- Admin Panel: Management interface for system administration
- APIs: Python and Go services for data retrieval and processing
- Container: Dockerized environment for dark web scraping
- Database: PostgreSQL database for storing indexed data
- Data Loaders: Scripts to collect and process data
- NGINX: Reverse proxy for routing traffic to different services
- Docker: Containerization for easy deployment and scaling
You can download the data that has already been scraped by the platform at kaggle.com/snowkluster
- Docker and Docker Compose
- Node.js 22+
- Python 3.11+
- Go 1.21+
-
Clone the repository:
git clone https://github.com/snowkluster/TAP.git cd TAP -
Start dashboard frontend:
cd frontend npm install npm run dev -
Start admin panel [frontend]:
cd admin/frontend npm install npm run dev -
Start admin panel [backend]:
cd admin/backend npm install node app.js -
Start API:
pip install -r requirements.txt cd api ./build.sh ./starter.sh -
Start the platform using Docker Compose:
./start.sh
-
Access the services:
- Main Portal: http://portal.localhost
- Admin Dashboard: http://dashboard.localhost
The project uses Docker Compose to orchestrate multiple services:
- NGINX: Reverse proxy for routing traffic
- PostgreSQL: Database for storing collected data
- SQLite: Database for backup storage incase of failure of PSQL Database
The compose.yml file defines these services and their configurations.
The platform uses two networking approaches:
- Host Network: For the NGINX service, allowing direct access to localhost services
- Bridge Network: For the database and other services, providing container isolation
For frontend development:
cd frontend
npm install
npm run devFor admin panel development [frontend]:
cd admin/frontend
npm install
npm run devFor admin panel development [backend]:
cd admin/backend
npm install
node app.jsFor API development:
cd api
./build.sh
./starter.sh- Live Search: Query across multiple data sources
- Breach Search: Find compromised credentials
- Darknet Feed: Monitor latest dark web activities
- Ransomware Post Tracking: Stay updated on ransomware group activities
- IP & Hash Analysis: Check reputation and malware indicators
- Cybersecurity News: Latest updates from the security community
The platform provides several API endpoints:
:8010/search/": Search breached forums for records:8002/search/: Search doxbin forums for records:8013/search/: Search nulled forums for records:8014/search/: Search OnniForums forums for records8004:/check_ip/?ip=:<IP_ADDR>: Check IP reputation8006:/check/:<FILE_HASH>: Verify file hashes and reputation8009:/scrape/: Get latest ransomware posts:8008/: Check indicators of compromise
For further details look at API Docs
The platform uses NGINX as a reverse proxy to route traffic to different services:
portal.localhostroutes to the main frontend applicationdashboard.localhostroutes to the admin dashboard
The NGINX configuration is stored in public/nginx.conf and is mounted into the NGINX container.
PostgreSQL is used as the primary database with the following configuration:
- Username: dbuser
- Database: darkweb
- Port: 5432
Data persistence is managed via Docker volumes.
The repository includes several utility scripts:
clean.sh: General cleanupclean-api.sh: API-specific cleanupwlc.sh: Welcome script
This platform is designed for legitimate security research and threat intelligence purposes only. See SECURITY.md for security policies and responsible usage guidelines.
Contributions are welcome! Please check the TODO.md file for areas that need help. Follow these steps:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add some amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.