← RED SPECTER RAVEN
OverviewDocsGitHubHome

RAVEN Documentation

Conversational Threat Intelligence
V1.0.0
CONTENTS Overview Installation 7 Subsystems Intel Sources (8) Dark Web Sources (6) Query Intents (10) Alert Types (6) UNLEASHED Mode CLI Reference Integration Pipeline Position

Overview

RAVEN is a conversational threat intelligence engine. It accepts natural language queries, fans out across 8 structured API sources and 6 dark web sources, fuses the results, and delivers intelligence through an interactive terminal interface.

Traditional threat intel platforms require rigid query syntax, manual pivoting, and separate tools for surface and dark web. RAVEN unifies everything into a single conversation. Ask a question. Get an answer. Drill deeper. Export to ORION, IDRIS, NEMESIS, or your SIEM.

RAVEN listens to the dark. It returns what matters.

Installation

pip install red-specter-raven
raven --help

7 Subsystems

#SubsystemFunction
1PARSERNatural language query engine — interprets operator questions, classifies into 10 intents, extracts indicators and context
2INTELSurface web intelligence — queries 8 structured API sources in parallel, normalises and correlates results
3DARKDark web intelligence — 6 dark web sources including Tor hidden services, paste sites, breach databases, forums, ransomware leak sites, and marketplaces. UNLEASHED-gated
4ORCHESTRATORFusion engine — merges INTEL and DARK results, deduplicates findings, enriches context, scores confidence
5TUIConversational terminal — rich interactive interface with session persistence, follow-up questions, and indicator pivoting
6EXPORTOutput pipeline — feeds intelligence to ORION, IDRIS, NEMESIS, or any SIEM via JSON, STIX/TAXII, and CSV export
7WHISPERContinuous monitoring — background watchdog with 6 alert types, runs silently until something matters

Intel Sources (8)

#SourceIntelligence
1ShodanInternet-wide scan data, exposed services, banners, vulnerabilities, device metadata
2CensysCertificate transparency, host enumeration, protocol analysis, cloud asset discovery
3VirusTotalFile/domain/IP reputation, malware associations, passive DNS, detection ratios
4OTX (AlienVault)Open threat exchange pulses, IOC feeds, community threat intelligence
5GreyNoiseInternet noise vs. targeted activity, mass scanner identification, benign traffic filtering
6AbuseIPDBIP abuse reports, confidence scores, attack categories, ISP and geolocation data
7URLhausMalware distribution URLs, payload tracking, campaign association, takedown status
8PulsediveIOC enrichment, threat feeds, risk scoring, indicator relationships and pivoting

Dark Web Sources (6)

#SourceIntelligenceUNLEASHED
1Tor Hidden ServicesOnion site monitoring, content indexing, service availability trackingLive
2Paste SitesCredential dumps, data leaks, threat actor communications, code samplesLive
3Breach DatabasesCompromised credentials, email/password pairs, breach metadata and timelinesLive
4Dark Web ForumsThreat actor discussions, exploit trading, target planning, vulnerability disclosureLive
5Ransomware Leak SitesVictim listings, stolen data previews, negotiation timelines, gang attributionLive
6Marketplace MonitoringCredential sales, access brokering, malware-as-a-service listings, pricing intelligenceLive

Query Intents (10)

#IntentExample Query
1Breach Lookup"Has example.com been breached?"
2IOC Enrichment"What do we know about 185.220.101.1?"
3Threat Actor Profile"Tell me about LockBit 3.0"
4Domain Intelligence"What's the threat posture for evil-corp.com?"
5Credential Exposure"Are any @company.com credentials on the dark web?"
6Malware Analysis"What campaigns use this SHA256 hash?"
7Infrastructure Mapping"What infrastructure does this C2 IP connect to?"
8Vulnerability Intel"What's being actively exploited this week?"
9Dark Web Monitoring"Is our company name mentioned on any leak sites?"
10Reputation Check"Is this URL safe to visit?"

Alert Types (WHISPER)

#Alert TypeTrigger
1New BreachMonitored domain appears in new breach database entry
2Credential LeakMonitored email patterns appear on paste sites or dark web forums
3Dark Web MentionOrganisation name, domain, or keywords appear in dark web sources
4IOC ChangeTracked indicator changes risk score, gains new associations, or appears in new campaigns
5Threat Actor ActivityMonitored threat actor posts new victims, tools, or communications
6Infrastructure ShiftTracked C2 infrastructure changes IP, domain, or hosting provider

UNLEASHED Mode

ModeFlagsWhat It Does
Standard(none)Passive API queries only. 8 surface web intel sources. No dark web access. No Tor traffic.
Dry Run--overrideSimulates dark web collection. Shows what would be retrieved from 6 dark web sources. Ed25519 required. No Tor connections.
Live--override --confirm-activeActive dark web intelligence. Tor-routed scraping across all 6 dark web sources. Real connections to hidden services.

CLI Reference

CommandDescription
raven ask "<query>"Natural language query — PARSER classifies intent and routes to appropriate sources
raven watch <domain>Start WHISPER continuous monitoring for a domain or organisation
raven breach <domain>Direct breach lookup — checks all breach databases and dark web sources
raven sourcesList all configured intel sources with API key status and health
raven ask "<query>" --override --confirm-activeUNLEASHED live query — includes dark web sources via Tor
raven watch <domain> --alerts emailWHISPER monitoring with email alert delivery
raven ask "<query>" --export jsonQuery with structured JSON export
raven ask "<query>" --export stixQuery with STIX/TAXII export for SIEM integration
raven tuiLaunch interactive conversational terminal session
raven ask "<query>" --feed orionQuery and pipe results directly to ORION for reconnaissance

Integration

ORION (Reconnaissance)

RAVEN feeds threat intelligence to ORION to enrich reconnaissance. When RAVEN identifies a threat actor's infrastructure, ORION can immediately scan and map the attack surface. Use --feed orion to pipe results directly.

IDRIS (Governance Discovery)

RAVEN's breach and credential exposure data feeds into IDRIS for governance and compliance assessment. Discovered credential leaks trigger IDRIS identity governance workflows.

NEMESIS (Reasoning Validation)

RAVEN intelligence provides real-world context for NEMESIS reasoning chains. Threat actor TTPs from RAVEN inform NEMESIS attack simulations and validation scenarios.

SIEM Integration

RAVEN exports to any SIEM via structured JSON and STIX/TAXII. IOCs, threat actor profiles, breach data, and dark web intelligence flow directly into your security operations platform.

Pipeline Position

Tool 26 in the Red Specter offensive pipeline. RAVEN is the conversational threat intelligence layer — it gathers, fuses, and delivers intelligence from both the surface and dark web through natural language interaction.

RAVEN listens to the dark. It returns what matters.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS CRYPTOGRAPHICALLY SIGNED AND LOGGED. MISUSE VIOLATES THE COMPUTER MISUSE ACT 1990 AND EQUIVALENT LEGISLATION.