Onion Site Scanner for Dark Web Monitoring
Search, collect, and analyze .onion URLs on Linux Server for threat intelligence
Overview
Search and collect .onion URLs using OnionSearch on a Linux server.
Run Tor for anonymous access and safe data retrieval.
Store and analyze harvested onion domains for threat intelligence.
Extract IOCs like URLs, keywords, and hashes from results.
Summarize findings to identify potential leaks or malicious activity.
- Tor-based dark web scanning
- Automated .onion URL collection
- IOC extraction & enrichment
- Threat intelligence reporting
What You'll Learn
-
Tor Setup
Install and run Tor for anonymous browsing.
-
OnionSearch Usage
Search and collect .onion URLs safely.
-
Threat Intel Basics
Analyze Dark Web data for security insights.
Prerequisites
- **Linux Basics** — Package install, commands, navigation.
- **VM/Cloud Skills** — Setup Ubuntu in VirtualBox or cloud.
- **Tor Awareness** — Understand anonymity and safe research.
About Trainer
Rajneesh Gupta
Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity". As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Related Projects
Linux File System Analysis
Practical triage of Linux file systems for anomalies, metadata, and hidden files
Apache Server Log Analysis using Splunk
Detecting Brute Force, SQL Injection, XSS, and Suspicious Web Activity from Apache Access Logs with Splunk SIEM
Practical AWS Cloud Security Posture Assessment Using Scout Suite
Identify real-world AWS attack surfaces through visual security posture analysis.