Precision Intelligence Engineering
Tor-routed discovery, capture, and classification across hidden services — delivering decision-ready artefacts for defence, response, and investigations.
Dark Net Recon combines stealth collection with forensic capture to map risk, surface exposure, and preserve evidence from hidden services. It pairs automated discovery with analyst validation to keep findings actionable and repeatable.
SOCKS5 routing with jittered backoff and retry controls for volatile endpoints.
Full-page screenshots, HTML dumps, and HAR logs to support replay and audit.
Vision models and OCR extract meaning from image-only marketplaces and posts.
PGP, emails, usernames, credential hints, crypto wallets, and contact vectors.
Follow-on discovery to enumerate related sellers, mirrors, and forum threads.
SHA256-tagged artefacts with timestamps, source refs, and session logs.
Backed by the VEILFRAME pipeline for darknet reconnaissance and artefact retention.
Enumerate fresh `.onion` nodes and mirrors using entropy-aware mutation and curated seeds.
Verify exposure, capture proofs (screenshots/DOM/HAR), and pull entities for action.
Revisit targets on a schedule, diff changes, and push alerts to owners or SOAR.
/evidence/
2025-08-31T05-59-58Z/
capture/
0001.png # SHA256: 8b2d…cf
0001.dom.html
0001.har.json
entities/
entities.csv # pgp,email,username,wallet
indicators/
iocs.jsonl
session.json # timings, exit node, status
Exact layout and fields align to your case file structure on request.
Yes. Screenshots, DOM, and HAR provide a verifiable snapshot for review and handover.
OCR and vision models extract text and cues from screenshots to aid classification.
Yes. We schedule revisits, diff changes, and surface alerts with context.
SHA256-tagged assets with timestamps, source references, and session logs.
Brief us on targets, timelines, and desired outputs. We respond with scope and a plan you can act on.