A Dark Web OSINT tool for discovering and validating .onion links from various sources.
This tool is intended for security research and educational purposes. Users are responsible for compliance with all applicable laws. Only use on systems you own or have explicit permission to test.
- Extract .onion links from URLs, files, or text
- Automatic link categorization (7 categories)
- SQLite database with historical tracking
- Multi-threaded link validation (alive/dead checking)
- Link search functionality
- 15 rotating User-Agents
- Comprehensive error handling
Links are automatically categorized as:
- Marketplace
- Forum
- Service
- Social
- Blog
- Directory
- Other
pip install requests beautifulsoup4Tor must be running on 127.0.0.1:9050.
-
Install Tor:
# Debian/Ubuntu sudo apt install tor sudo systemctl start tor # macOS brew install tor tor
-
Install dependencies:
pip install requests beautifulsoup4
torsocks python oniextractor.py- Extract from URL
- Extract from file
- Extract from text input
- Check if links are alive (batch validation)
- Show alive links from database
- Search links
- Use database (yes/no)
- Number of workers for batch checking (default: 5)
- Category filter for search
onion_links/
├── onion_links.json # Full data with categories
├── onion_links.txt # Plain link list
└── links.db # SQLite database
links table:
- link, category, first_seen, last_seen
- source, status, title, description
link_checks table:
- link_id, timestamp, status_code
- response_time, is_alive
Multi-threaded alive/dead checking:
- Configurable worker threads
- Response time tracking
- Status code logging
- Database status updates
Search by:
- Keyword in link
- Category filter
- Status (alive/dead)
- JSON: Complete data with metadata and timestamps
- TXT: Simple sorted list of links
Version : 1.0
License: MIT License - See LICENSE file
Developer: DR4CBOI
Contact: dr4cboi@protonmail.com