RAVEN

RAVEN listens to the dark. It returns what matters. Conversational threat intelligence — Tool 26.
7
Subsystems
8
Intel Sources
6
Dark Web Sources
174
Tests Passing
pip install red-specter-raven
You scan surface feeds / But never touch the dark web / Credentials are already for sale / Threat actors named your org three weeks ago / Breach data sits in paste sites / IOCs are cold before you see them / Intelligence is not a dashboard / You're asking the wrong questions You scan surface feeds / But never touch the dark web / Credentials are already for sale / Threat actors named your org three weeks ago / Breach data sits in paste sites / IOCs are cold before you see them / Intelligence is not a dashboard / You're asking the wrong questions

Surface Feeds Are Not Intelligence

Most threat intelligence tooling aggregates structured API feeds and presents them as a dashboard. That's not intelligence — that's collection. Real intelligence requires reaching into the dark web, correlating across sources, understanding context, and answering questions a human actually asks. RAVEN is a conversational engine built around that model.

Cold IOCs By the Time You See Them

By the time an IOC appears in a surface-web feed it's already been weaponised. The dark web had it first. Paste sites had it first. RAVEN reaches into those sources directly — not hours later through a normalised feed.

Your Credentials Are Already For Sale

Breach databases, combo lists, credential markets — they don't submit to OSINT APIs. They live on Tor hidden services, dark forums, and paste sites that standard tooling never touches. RAVEN's DARK subsystem does.

Threat Actors Named You Three Weeks Ago

Dark web forums, ransomware leak sites, and marketplace chatter are where adversaries operate. Organisations are named, targeted, and discussed long before any public disclosure. WHISPER watches continuously.

Rigid Query Syntax Is a Bottleneck

Every threat intel platform forces you into their schema. RAVEN's PARSER subsystem accepts natural language — ask about a domain, an IP, a threat actor, a breach, or an infrastructure cluster in plain English.

Intelligence Silos Lose Context

Surface feeds and dark web sources speak different languages. RAVEN's ORCHESTRATOR merges them — deduplication, confidence scoring, context enrichment — producing a unified picture from disparate sources.

No Downstream Integration

Intelligence that stays in a dashboard generates no action. RAVEN's EXPORT subsystem feeds directly into ORION, IDRIS, NEMESIS, and enterprise SIEM via structured JSON and STIX/TAXII — intelligence becomes response.

Intelligence Through Conversation

RAVEN doesn't just aggregate feeds. It understands natural language queries, fuses intelligence from 8 API sources and 6 dark web sources, deduplicates and enriches context, and delivers results through a conversational terminal interface. Ask it anything. It knows where to look.

# Subsystem Function What It Does
01 PARSER Natural Language Query Interprets operator questions in natural language. 10 query intents — from breach lookups and IOC enrichment to threat actor profiling and dark web monitoring. No rigid syntax. Just ask.
02 INTEL 8 API Sources Shodan, Censys, VirusTotal, OTX, GreyNoise, AbuseIPDB, URLhaus, and Pulsedive. Structured threat intelligence from the surface web's best feeds, queried in parallel and correlated automatically.
03 DARK 6 Dark Web Sources Tor hidden services, paste sites, breach databases, dark web forums, ransomware leak sites, and marketplace monitoring. UNLEASHED-gated. Passive, dry run, or live Tor scraping.
04 ORCHESTRATOR Fusion & Deduplication Merges results from INTEL and DARK subsystems. Deduplicates findings, enriches context, scores confidence, and builds a unified intelligence picture from disparate sources.
05 TUI Conversational Terminal Rich terminal interface for interactive threat intelligence sessions. Conversational flow — ask follow-up questions, drill into results, pivot across indicators. History and session persistence.
06 EXPORT ORION / IDRIS / NEMESIS / SIEM Feeds intelligence directly into ORION for reconnaissance, IDRIS for governance discovery, NEMESIS for reasoning validation, or any SIEM via structured JSON and STIX/TAXII export.
07 WHISPER Continuous Monitoring Background watchdog. 6 alert types — new breaches, credential leaks, dark web mentions, IOC changes, threat actor activity, and infrastructure shifts. Runs silently until something matters.

Ask RAVEN Anything.

Natural language query session — dark web mode:

raven> what breach data exists for acmecorp.com?
[PARSER] Intent: breach_lookup — domain: acmecorp.com
[INTEL] Querying 8 surface sources in parallel...
  VirusTotal: 3 related domains flagged, 1 IP blacklisted
  OTX: 2 active pulses, last updated 6h ago
  AbuseIPDB: 0 abuse reports on primary IP
[DARK] Querying 6 dark web sources — UNLEASHED active...
  BREACH DB: 847 credentials found — acmecorp.com (2024-11)
  PASTE SITE: Combo list reference, 12h ago
  FORUM: 1 mention — RaaS group, target shortlist
[ORCH] Fusing 14 findings, deduplicating, scoring...

SUMMARY — Risk: HIGH | 847 creds exposed | Active RaaS interest
  Recommend: IDRIS governance scan + credential reset protocol

Natural Language

Ask in plain English. PARSER resolves intent, selects subsystems, and routes the query — no syntax to memorise.

Parallel Collection

All 8 surface sources and up to 6 dark web sources queried in parallel. No waiting for sequential API calls.

Ed25519 Signed Reports

Every intelligence session produces a signed, timestamped evidence package. RFC 3161 anchored. Tamper-evident.

Downstream Integration

RAVEN findings flow directly into ORION, IDRIS, NEMESIS, and SIEM. Intelligence becomes immediate action.

7
Subsystems
8
Intel Sources
6
Dark Web Sources
174
Tests Passing
0
Failures

UNLEASHED Gate

Cryptographic override. Private key controlled. One operator. Founder's machine only. The DARK subsystem — live Tor routing to 6 hidden sources — is gated behind Ed25519. Passive API queries run without a key. Dark web access requires it.

Standard Mode

Passive API queries only. Surface web intelligence from 8 structured sources. No dark web access. No Tor traffic. No detection risk. Full PARSER + INTEL + ORCHESTRATOR + TUI.

Dry Run Mode

Simulates dark web collection. Shows what sources would be queried, what data would be retrieved — down to estimated breach counts and forum mention likelihood. Ed25519 required. No Tor connections made.

Live Mode

Active dark web intelligence. Tor-routed scraping across all 6 dark web sources. Real connections to hidden services. WHISPER monitoring engaged. Full DARK subsystem operational.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

Ed25519 Cryptographic Override
RAVEN UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Every Finding Mapped

8 Sources

Surface Intelligence

  • Shodan — internet scan data
  • Censys — certificate and host exposure
  • VirusTotal — malware and domain reputation
  • OTX — open threat exchange pulses
  • GreyNoise — internet noise analysis
  • AbuseIPDB — abuse report aggregation
  • URLhaus — malicious URL tracking
  • Pulsedive — threat feed correlation
6 Sources

Dark Web Intelligence

  • Tor hidden service scraping
  • Paste site monitoring
  • Breach database lookups
  • Dark web forum surveillance
  • Ransomware leak site tracking
  • Underground marketplace monitoring
Cryptographic

Evidence Integrity

  • Ed25519 digital signatures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • STIX/TAXII export
  • JSON structured output
  • SIEM-native integration

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter RAVEN is intended for authorised security testing and threat intelligence operations only. Dark web collection features require UNLEASHED activation and must only be used against infrastructure you own or have explicit written permission to assess. Unauthorised use may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. Apache License 2.0.