Skip to content

Onion Endpoints Fetcher is a web-based tool designed to fetch and display endpoints from onion sites on the TOR network.

License

Notifications You must be signed in to change notification settings

iqlipx/Onion_Endpoints_Fetcher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Disclaimer: This tool is intended for educational and research purposes only. Unauthorized use of this tool is prohibited. Use it responsibly and at your own risk.


🤔 What is this?

Onion Endpoints Fetcher is a Python Flask-based web application designed for dark web exploration and investigation .

This tool helps cybersecurity researchers, analysts, and enthusiasts explore the hidden web, analyze the structure of onion sites, and gather information for investigative purposes while maintaining anonymity through TOR.

Onion Endpoints Fetcher

"What about anonymity?"

That's the point. You don't need to worry about it now, our tool utilizes tor for anonymity and privacy, identifies entry and exit nodes while esthablishing a tor circuit, rebuild the tor circuit each time you run the tool and flush old circuits.

✨ Features

  • Fetch Endpoints: Extract endpoints from .onion domains.
  • Rate Limiting: Customize rate limits to manage request frequencies.
  • Pagination: Control the number of pages to fetch results from.
  • TOR Integration: Leverage the TOR network to maintain privacy.
  • Live Updates: View the current TOR entry and exit nodes.
  • File Saving: Save the fetched endpoints into individual files named according to the domains(e.g., abcxyz.onion → abcxyz.txt).

📋 Requirements

  • Python 3 [sudo apt install python3]
  • Python3-pip [sudo apt install python3-pip]
  • Flask
  • Stem
  • Requests
  • BeautifulSoup
  • Termcolor
  • Tor [sudo apt install tor]
  • Proxychains [sudo apt install proxychains4]

🚀 Getting Started

1.Clone the Repository:

git clone https://github.com/iqlipx/Onion_Endpoints_Fetcher.git
cd Onion_Endpoints_Fetcher

2.Install Dependencies:

pip install -r requirements.txt

3.Run the Application:

  • Run with flask flask run
  • Normal way with python3 python3 app.py

If you encounter the error:

  ERROR - An error occurred: Authentication failed: unable to read '/run/tor/control.authcookie' ([Errno 13] Permission denied: '/run/tor/control.authcookie')

Use the run.sh script to start the application:

  chmod +x run.sh
  ./run.sh
  • The run.sh script will adjust the necessary permissions for the control.authcookie file and then start the Flask application.

4.Access the Tool:

Open your browser and navigate to http://localhost:5000 OR http://127.0.0.1:5000 to start using the Onion Endpoints Fetcher! 🖥️

🛠️ Usage

  1. Enter Domain: Input the .onion domain you want to explore.

    Note: Do not include a trailing slash (/) at the end of the domain. For example:

    ❌ abcxyz.onion/
    ✅ abcxyz.onion

  2. Set Parameters: Adjust the "rate limit" and "pagination" as needed.

    Recommended:
    Rate Limit: 2 seconds ⏱️
    Pagination: 1 to 3 pages 📄

  3. Fetch Endpoints: Click "Fetch Endpoints" to start the process. Results will be saved in the fetched_endpoints directory. 📂

🤝 Contributions and Issues

  • 💡 Contribute: Got a great idea or improvement? We’d love your help! Please make sure your contributions are in line with ethical practices and enhance the security and functionality of the tool. 🌟

  • 📝 Report Issues: If you encounter issues or bugs, please report them on our GitHub repository. Your feedback helps us improve and keep the project in top shape. 🐞

📜 License

This project is licensed under the [MIT License]. For more details, please see the LICENSE file in the repository.

⚠️ Disclaimer

This tool is provided for educational purposes only. The developers are not responsible for any misuse or illegal activities conducted with this tool. Use it responsibly and ethically 🙏