dirtyD4N2dotSI - Real Strategic Intelligence System
⚠️ NOTICE: This system now uses REAL breach databases and OSINT sources
Advanced OSINT platform with empirical evolution, real breach data integration, and genuine intelligence correlation for strategic password analysis.
🚀 Live Deployment
🌐 Production URL: https://strategic-intel.vercel.app
Real Intelligence Endpoints:
- Real OSINT Analysis:
/real(connects to actual breach DBs) - Real Strategic Intel:
/real-osint(full intelligence correlation) - API Direct:
/api/real?email=target@domain.com
Demo Endpoints (Synthetic Data):
- Generation 3:
/generation3(hybrid_adaptive) - Generation 6:
/generation6(recency_first) - Generation 9:
/generation9(uniqueness_first)
🔍 Real Data Sources
Breach Intelligence:
- HaveIBeenPwned - Verified breach data
- DeHashed - Password recovery database
- LeakOSINT - Stealer logs and pastes
OSINT Correlation:
- Shodan - Infrastructure reconnaissance
- GitHub - Social engineering intelligence
- VirusTotal - Security threat indicators
- Censys - Technical footprint analysis
Empirical Evolution:
- Real Pattern Learning - From actual breach data
- Temporal Correlation - Real password evolution
- Cross-Platform Analysis - Genuine username correlation
📡 Real API Usage
# Real Strategic Intelligence Analysis
curl "https://strategic-intel.vercel.app/real?email=danieloobregon23@gmail.com"
# With depth control
curl "https://strategic-intel.vercel.app/real?email=target@domain.com&depth=comprehensive"
# Response includes:
# - breachExposure: Real breach database results
# - osintCorrelation: Cross-platform intelligence
# - empiricalEvolution: Data-driven pattern learning
# - strategicAssessment: Risk and threat analysis
# - actionableIntelligence: Operational recommendations
⚙️ Configuration
Environment Variables (Required for Real Data):
# Breach Data Sources
HIBP_API_KEY=your_haveibeenpwned_key
DEHASHED_USERNAME=your_dehashed_username
DEHASHED_API_KEY=your_dehashed_key
LEAKOSINT_API_KEY=your_leakosint_key
# OSINT Intelligence
SHODAN_API_KEY=your_shodan_key
VT_API_KEY=your_virustotal_key
GITHUB_TOKEN=your_github_token
# Optional: Additional sources
CENSYS_API_KEY=your_censys_key
SPYSE_API_KEY=your_spyse_key
API Key Sources:
- HaveIBeenPwned API
- DeHashed
- Shodan
- VirusTotal
🧬 Real Intelligence Features
✅ Empirical Evolution:
- Real Pattern Learning: Extracts patterns from actual breach data
- Temporal Evolution: Analyzes real password change patterns over time
- Cross-Service Correlation: Real username reuse across platforms
- Hash Distribution Analysis: Real-world hash type frequencies
✅ Genuine OSINT Correlation:
- Social Media Intelligence: GitHub, Twitter, LinkedIn analysis
- Technical Footprint: Shodan, Censys infrastructure mapping
- Security Indicators: VirusTotal, URLVoid threat analysis
- Intelligence Fusion: Multi-source correlation and validation
✅ Actionable Intelligence:
- Immediate Threat Assessment: Based on real exposure data
- Strategic Target Generation: From actual password patterns
- Operational Vectors: Password attack, social engineering, technical exploit
- Continuous Monitoring: Real-time breach and OSINT alerts
📊 Architecture
dirtyD4N2dotSI/
├── api/
│ ├── real-strategic-osint.js # Real intelligence API
│ └── index.js # Demo endpoints
├── engines/
│ ├── real-breach-collector.js # Actual breach database integration
│ ├── empirical-evolution.js # Real data-driven evolution
│ └── real-osint-correlator.js # Multi-source intelligence fusion
└── .env.example # API key configuration template
⚠️ Legal and Ethical Usage
This system connects to real breach databases and performs genuine intelligence gathering. Users must:
- ✅ Only analyze email addresses you own or have explicit permission to investigate
- ✅ Comply with all applicable laws and regulations
- ✅ Use intelligence for defensive security purposes only
- ❌ Do not use for unauthorized access attempts
- ❌ Do not use for malicious purposes
🎯 Real-World Results
The system provides genuine intelligence based on:
- Actual data breaches from verified sources
- Real password patterns extracted from breach databases
- Genuine cross-platform correlation across OSINT sources
- Empirical evolution trained on real password evolution data
Example Output:
{
"status": "Real Strategic OSINT Complete",
"summary": {
"keyFindings": [
"Target exposed in 3 verified data breaches",
"2 passwords recovered from breach databases",
"Active presence on 2 social media platforms"
],
"riskLevel": "HIGH",
"confidence": "HIGH"
}
}
This represents a complete shift from synthetic demo data to real-world strategic intelligence capabilities.
Fresh Start Context: Lessons from dirtyD4N2dotNO
What We Learned
- Password diversity: Real targets use multiple passwords across time/services
- Hash complexity: MD5, bcrypt, SHA variants require different approaches
- Pattern flexibility: Can’t assume any single password family (like “Slayer23”) is primary
- Frequency matters: Most common passwords ≠ most valuable passwords
- Temporal relevance: 2024 password > 2017 password for active accounts
New Strategic Approach
- Dynamic password intelligence that analyzes ALL patterns
- Flexible hash strategy with auto-detection
- Adaptive pattern recognition without hardcoded assumptions
- Intelligence prioritization based on temporal relevance and strategic value
Strategic Intelligence System
Project Details
- nobbydoo80/dirtyD4N2dotSI
- Last Updated: 6/3/2025
Recomended MCP Servers
This project implements a Python-based MCP (Model Context Protocol) server that acts as an interface between Large Language...
🪐 ✨ Model Context Protocol (MCP) Server for Jupyter.
A MCP server that lists all available MCP services for easy copying and usage
MCP server for Grafana
tweet, sentiment analysis
This project wraps the WeChat OCR functionality from the excellent wechat-ocr project into a simple REST API service...
MCP(Model Context Protocol) server for Upbit





