39 real collectors. 7 autonomous AI agents. Every finding has a 3-link proof chain. Multi-tenant MSSP platform with D1-D5 exposure scoring. Zero fake data.
CISA KEV, NVD, MITRE ATT&CK, ThreatFox, Feodo, OpenPhish, RansomFeed, Shodan, VirusTotal, HIBP, and 29 more. 21 free.
Dark web triage every 30 min. Sector campaign detection every 6h. False positive memory. Severity assessment. Attribution reasoning.
Every finding shows: what it affects (NVD CPE), how we know the customer uses it, how the correlation engine matched (S1-S8).
Actor Intent (35%), Target Profile (25%), Sector Risk (20%), Dark Web (10%), Surface Exposure (10%). CISOs see where to focus.
Ransomware leak monitoring, paste dump scanning, credential exposure. Clickable detail modals with AI triage and source verification.
Customer isolation, tiered pricing, SLA tracking, 12-step auto-onboarding. One command deploys everything.
Click any finding โ see exactly where data came from and why it matters.
NVD CPE data โ vendor, product, version, CVSS score, CISA KEV exploitation status.
Discovery source + confidence score. Verify via Wappalyzer, Shodan, crt.sh, BuiltWith.
8 strategies (S1-S8): domain, subdomain, IP, email, tech/CPE, context, typosquat, token.
One command. 10 Docker services. Real threat intel in minutes.
# Clone and deploy
git clone https://github.com/3sk1nt4n/arguswatch-ai.git
cd arguswatch-ai
docker compose up -d --build
# Open dashboard
open http://localhost:7777
โก View on GitHub
GCFA ยท GCIH ยท GMON ยท GCTD ยท GDSA ยท GCIA ยท SANS Ambassador ยท 4 USPTO Patents