monitoring-darkweb-sources

Installation
SKILL.md

Monitoring Dark Web Sources

When to Use

Use this skill when:

  • Establishing continuous monitoring for organizational domain names, executive names, and product brands on dark web forums
  • Investigating a reported data breach claim found on a ransomware leak site or paste site
  • Enriching an incident investigation with context about stolen credentials or planned attacks

Do not use this skill without proper operational security measures — dark web browsing without isolation exposes analyst infrastructure to adversary counter-intelligence.

Prerequisites

  • Commercial dark web monitoring service (Recorded Future, Flashpoint, Intel 471, or Cybersixgill)
  • Isolated operational environment: Whonix OS or Tails OS running in a VM with no persistent storage
  • Keyword watchlist: organization domain, key executive names, product names, IP ranges, known credentials
  • Legal guidance confirming passive monitoring is authorized in your jurisdiction

Workflow

Related skills
Installs
20
GitHub Stars
6.3K
First Seen
Mar 15, 2026