Skip to content

darkefx/Dark-Web-Threat-Intelligence-Research

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ Dark Web Marketplaces Threat Intelligence Report

Tor Network Research Only Lawful Use Status

🔐 Executive Summary

This project presents a deep threat intelligence analysis of various darknet marketplaces known for illicit trade in hacking tools, fraud services, and contraband. The research was conducted inside a sandboxed and air-gapped virtual lab using Tor routing and strict operational security (OpSec) protocols.

The purpose is to support lawful intelligence operations by cybersecurity professionals, OSINT researchers, and authorized law enforcement bodies.


📂 Project Structure

  • Logs.txt: Primary log file including links, statuses, risk assessments, and vendor activity
  • 🛡️ Marketplace Risk Analysis
  • 💻 Sandbox Environment Notes
  • 🔗 Onion URLs from verified sources
  • ⚠️ Exit Scams & Fraud Database

🧠 Key Intelligence Points

Market Status Risk Level Notes
Venus Scam High Fake vendors, phishing, admins linked to Quest
Abacus Active Safe Secured PGP auth, vendor verified
Torzon Active Medium Mixed reputation, top vendor "heartkidnapper"
Nexus Active Medium Normal security, average trust rating
Archetyp Verified Safe PGP secured, listed on Dark.Fail

📍 Full Dark Web Intelligence Log

Entry #001 - Source: Ahmia - Date: 2025-06-03

Link #001

Link #002

Link #003

Link #004

Entry #002 - Source: dark.fail - Date: 2025-06-03

Link #001

  • Title: Archetyp Market
  • URL: 4pt4axjgzmm4ibmxplfiuvopxzf775e5bqseyllafcecryfthdupjwyd.onion
  • Type: Drugs
  • Notes: Registration requires PGP; very secure
  • Status: Verified on Dark.Fail
  • Risk: ⚠ SAFE

⚠️ Scam/Down/Exit Scammed Markets

Market Status Reason
Quest, Venus, Metaverse Scam Fake vendors, phishing ops
Holy Grail, SuperMarket Exit Scam Admins vanished, no refunds
Tor2Door, Cartel Exit Scam Same owners, reused scripts
El Chapo, Arizona Exit Scam Reused code, no real ops
Incognito Shutdown Officially down
Cypher, Pink Panther Exit Scam Known scam trails
Hermes, Bohemia Inactive Never took off
Dark0de Reborn Scam Fabricated vendor stats
Retro, Nemesis Scam Fake vendor profiles

🤔 Shared Infrastructure & Threat Actors

  • CMS Templates: Eckmar (v1.0 to v3.0) widely reused
  • Admin Overlap: Found in Cartel, Tor2Door
  • Phishing Ops: Cloned AlphaBay, Versus, Exchanger login UIs

💼 Environment Used

  • 🌟 Kali Linux VirtualBox VM
  • 🌐 Tor over Tails VPN
  • 🔐 Full network isolation (No bridge, no DNS leaks)
  • 📊 Manual transfer to air-gapped host for logging

📄 Legal Disclaimer

⚠️ WARNING: This repository contains links to live darknet (.onion) sites.

These links are provided strictly for threat research and reporting purposes. Do not access any content unless you are:

  • A certified cybersecurity professional conducting analysis
  • Working in a sandboxed TOR browser
  • Not engaging in any transactions or communications

The author does not condone illegal activity.

This project supports:

  • Cybercrime prevention
  • Government threat intel analysis
  • OSINT community awareness

👨‍💻 Author & Attribution

  • Author: Fsociety (Cyber Threat Analyst, OSINT)
  • Date: June 2025
  • Contact: Provided upon lawful request via secure channel
  • Context: Educational + Government submission

📘 License

This project is licensed under CC BY-NC 4.0. Use is limited to lawful, non-commercial, educational or intelligence purposes.

"To understand the threat, one must map the terrain. Knowledge, not commerce."

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors