Skip to content
forked from teal33t/poopak

POOPAK - TOR Hidden Service Crawler

Notifications You must be signed in to change notification settings

henryvgoda/poopak

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

96 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

POOPAK | TOR Hidden Service Crawler

License: GPL v3 Open Source Love made-with-python Generic badge

Screenshot

This is an experimental application for crawling, scanning and data gathering from TOR hidden services.

Features

  • Multi-level in-depth crawling using CURL
  • Link extractor
  • Extract Emails/BTC/ETH/XMR addresses
  • Extract EXIF meta data
  • Screenshot (using Splash)
  • Subject detector (using Spacy)
  • Port Scanner
  • Extract report from a hidden service (CSV/PDF)
  • Fulltext search through the directory
  • Language detection
  • Web application security scanning (using Arachni) - [Under Developing]
  • Docker based and Web UI

Licence

This software is made available under the GPL v.3 license. It means if you run a modified program on a server and let other users communicate with it there, your server must also allow them to download the source code corresponding to the modified version running there.

Dependencies

  • Docker (tested on Docker version 18.03.1)
  • Docker Compose (tested on version 1.21.1)
  • Python 3
  • pipenv

Install

Just run application with docker-compose:

docker-compose up -d

and next point your browser to localhost.

About

POOPAK - TOR Hidden Service Crawler

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 50.2%
  • HTML 34.4%
  • JavaScript 12.9%
  • CSS 2.3%
  • Dockerfile 0.2%