Stealth is the automateable Web Browser for the Web of Knowledge.
Stealth is an automateable Web Browser that focusses on increased Privacy, increased Automation,
adaptive Semantic Understanding and efficient Bandwidth Usage, no matter the cost.
Stealth's Design Goals try to embrace the Automation of User Interaction wherever possible,
so that users can focus on the important tasks while their Web Browser helps them to automate
repetitive tasks that would consume time unnecessarily. As everything is on the Web, everything
can be automated.
Its unique concept allows to automate and share Beacones (Site Adapters) and Echoes (Site Workflows)
with other local Peers in the same Network - or global Peers connected to Radar, so that once
a User automated a workflow for a specific Website others can simply reuse it, modify it or share
it with their trusted Peers.
Stealth is currently in the Pulic Alpha Stage and available under a Dual Licensing Model.
Radar is the Knowledge Tracker for the Web of Knowledge.
Radar is a peer-to-peer Knowledge Tracker that allows to learn from a Network of connected
Stealth Browsers, while helping its Users to discover Knowledge, related Articles,
the History of Changes, Author Biases or more advanced Automation Features.
It integrates nicely with Beacons (Site Adapters) to automate the extraction of Knowledge,
and Echoes (Site Workflows) to automate User Interactions with websites in a programmable,
repeatable and scheduled manner.
Users that connect to our Radar instances need to respect our Terms of Service and the Tholian Charter.
Radar is currently in the Prototype Stage and not yet disclosed to the public.
Recon is modern Network Forensics and Intrusion Detection for the Web of Knowledge.
Recon is a Network Forensics App that acts both passive and active inside a Network,
and tries to analyze observed Network Traffic incrementally to gain Intelligence
about malicious actors or potentially vulnerable Targets.
Its Classifiers use AI techniques to have the capability to identify Network Traffic
and to generate crafted payloads to scan remote services for vulnerable behaviours;
while trying to show a list of related CVEs that the vulnerable Target should be
Recon is currently in the Prototype Stage and not yet disclosed to the public.