Science Score: 44.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (12.5%) to scientific vocabulary
Last synced: 6 months ago
·
JSON representation
·
Repository
Basic Info
- Host: GitHub
- Owner: dashmeet2023
- License: other
- Language: Python
- Default Branch: main
- Size: 73.1 MB
Statistics
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
- Releases: 0
Created 9 months ago
· Last pushed 9 months ago
Metadata Files
Readme
Funding
License
Code of conduct
Citation
README.md
████████╗ ██████╗ ██████╗ ██████╗ ██████╗ ████████╗ ╚══██╔══╝██╔═══██╗██╔══██╗ ██╔══██╗██╔═████╗╚══██╔══╝ ██║ ██║ ██║██████╔╝ ██████╔╝██║██╔██║ ██║ ██║ ██║ ██║██╔══██╗ ██╔══██╗████╔╝██║ ██║ ██║ ╚██████╔╝██║ ██║ ██████╔╝╚██████╔╝ ██║ ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝ Open Source Intelligence Tool for the Dark Web
Status/Social links
Features
- Onion Crawler (.onion)
- Returns Page title and address with a short description about the site
- Save links to database
- Get data from site
- Save crawl info to JSON file
- Crawl custom domains
- Check if the link is live
- Built-in Updater
- Build visual tree of link relationship that can be quickly viewed or saved to an file
...(will be updated)
Dependencies
- Tor (Optional)
- Python ^3.9
- Poetry
Python Dependencies
(see pyproject.toml or requirements.txt for more details)
Installation
TorBot
- TorBot dependencies are managed using
poetry, you can find the installation commands below:sh poetry install # to install dependencies poetry run python torbot/main.py -u https://www.example.com --depth 2 --visualize tree --save json # example of running command with poetry poetry run python torbot/main.py -h # for help
Options
usage: Gather and analyze data from Tor sites. optional arguments: -u URL, --url URL Specifiy a website link to crawl --depth DEPTH Specifiy max depth of crawler (default 1) -h, --help Show this help message and exit -v Displays DEBUG level logging, default is INFO --version Show current version of TorBot. --update Update TorBot to the latest stable version -q, --quiet Prevents display of header and IP address --save FORMAT Save results in a file. (tree, json) --visualize FORMAT Visualizes tree of data gathered. (tree, json, table) -i, --info Info displays basic info of the scanned site --disable-socks5 Executes HTTP requests without using SOCKS5 proxy
- NOTE: -u is a mandatory for crawling
Read more about torrc here : Torrc
Curated Features
- [x] Visualization Module Revamp
- [x] Implement BFS Search for webcrawler
- [x] Use Golang service for concurrent webcrawling
- [x] Improve stability (Handle errors gracefully, expand test coverage and etc.)
- [ ] Randomize Tor Connection (Random Header and Identity)
- [ ] Keyword/Phrase search
- [ ] Social Media Integration
- [ ] Increase anonymity
- [x] Improve performance (Done with gotor)
- [ ] Screenshot capture
Contribution Guidelines
Found an issue?
If you face any issues in the project, please let us know by creating a new issue here.
Developer Guidelines
We welcome contributions to this project! Here are a few guidelines to follow:
- Fork the repository and create a new branch for your contribution.
- Make sure your code passes all tests by running
pytestbefore submitting a pull request todevbranch. - Follow the PEP8 style guide for Python code.
- Make sure to add appropriate documentation for any new features or changes.
- When submitting a pull request, please provide a detailed description of the changes made.
References
1. M. Glassman and M. J. Kang, “Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT),” Comput. Human Behav., vol. 28, no. 2, pp. 673–682, 2012.
2. D. Bradbury, “In plain view: open source intelligence,” Comput. Fraud Secur., vol. 2011, no. 4, pp. 5–9, 2011.
3. B. Butler, B. Wardman, and N. Pratt, “REAPER: an automated, scalable solution for mass credential harvesting and OSINT,” 2016 APWG Symp. Electron. Crime Res., pp. 1–10, 2016.
4. B. Zantout and R. A. Haraty, “I2P Data Communication System I2P Data Communication System,” no. April 2002, 2014.
5. J. Qin, Y. Zhou, G. Lai, E. Reid, M. Sageman, and H. Chen, “The dark web portal project: collecting and analyzing the presence of terrorist groups on the web,” in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 2005, pp. 623–624.
6. D. Moore, T. Rid, D. Moore, and T. Rid, “Cryptopolitik and the Darknet Cryptopolitik and the Darknet,” vol. 6338, 2016.
7. G. Weimann, “Going dark: Terrorism on the dark Web,” Stud. Confl. Terror., vol. 39, no. 3, pp. 195–206, 2016.
8. A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell, and G. Davies, “Surfacing collaborated networks in dark web to find illicit and criminal content,” in Intelligence and Security Informatics (ISI), 2016 IEEE Conference on, 2016, pp. 109–114.
9. T. Minárik and A.-M. Osula, “Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law,” Comput. Law Secur. Rev., vol. 32, no. 1, pp. 111–127, 2016.
10. K. Loesing, S. J. Murdoch, and R. Dingledine, “A Case Study on Measuring Statistical Data in the {T}or Anonymity Network,” in Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010), 2010.
11. B. Nafziger, “Data Mining in the Dark : Darknet Intelligence Automation,” 2017.
12. I. Sanchez-Rola, D. Balzarotti, and I. Santos, “The onions have eyes: A comprehensive structure and privacy analysis of tor hidden services,” in Proceedings of the 26th International Conference on World Wide Web, 2017, pp. 1251–1260.
13. Mouli VR, Jevitha KP. “Web Services Attacks and Security-A Systematic Literature Review.”, Procedia Computer Science. 2016 Jan 1;93:870-7.
14. Cova M, Felmetsger V, Vigna G. "Vulnerability analysis of web-based applications. InTest and Analysis of Web Services" 2007 (pp. 363-394). Springer, Berlin, Heidelberg.
15. B. R. Holland, “Enabling Open Source Intelligence (OSINT) in private social networks,” 2012.
16. S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Cryptogr. Mail. List https//metzdowd.com, 2009.
17. M. Wesam, A. Nabki, E. Fidalgo, E. Alegre, and I. De Paz, “Classifying Illegal Activities on Tor Network Based on Web Textual Contents”, vol. 1, pp. 35–43, 2017.
18. Sathyadevan S, Gangadharan S.“Crime analysis and prediction using data mining”. In Networks & Soft Computing (ICNSC), 2014 First International Conference on 2014 Aug 19 (pp. 406-412). IEEE.
19. Chau M, Chen H. "A machine learning approach to web page filtering using content and structure analysis. Decision Support Systems." 2008 Jan 1;44(2):482-94.
20. Ani R, Jose J, Wilson M, Deepa OS. “Modified Rotation Forest Ensemble Classifier for Medical Diagnosis in Decision Support Systems”, In Progress in Advanced Computing and Intelligent Engineering 2018 (pp. 137-146). Springer, Singapore.
21. Ani R, Augustine A, Akhil N.C. and Deepa O.S., 2016. “Random Forest Ensemble Classifier to Predict the Coronary Heart Disease Using Risk Factors”, In Proceedings of the International Conference on Soft Computing Systems (pp. 701-710). Springer, New Delhi.
Maintainers
- [X] PS Narayanan - Co-owner
- [X] KingAkeem - Co-owner
... see all contributors
License
Owner
- Login: dashmeet2023
- Kind: user
- Repositories: 1
- Profile: https://github.com/dashmeet2023
Citation (CITATION.cff)
# @InProceedings{10.1007/978-981-15-0146-3_19,
# author="Narayanan, P. S.
# and Ani, R.
# and King, Akeem T. L.",
# editor="Ranganathan, G.
# and Chen, Joy
# and Rocha, {\'A}lvaro",
# title="TorBot: Open Source Intelligence Tool for Dark Web",
# booktitle="Inventive Communication and Computational Technologies",
# year="2020",
# publisher="Springer Singapore",
# address="Singapore",
# pages="187--195",
# abstract="The dark web has turned into a dominant source of illegal activities. With several volunteered networks, it is becoming more difficult to track down these services. Open source intelligence (OSINT) is a technique used to gather intelligence on targets by harvesting publicly available data. Performing OSINT on the Tor network makes it a challenge for both researchers and developers because of the complexity and anonymity of the network. This paper presents a tool which shows OSINT in the dark web. With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network. This tool has several features which can help extract different intelligence.",
# isbn="978-981-15-0146-3"
# }
cff-version: 1.2.0
message: "If you use this software, please cite the following paper:"
authors:
- family-names: P. S.
given-names: Narayanan
affiliation: Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, India
- family-names: Akeem T. L.
given-names: King
affiliation: USPA Technologies
- family-names: R
given-names: Ani
affiliation: Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, India
keywords:
- tor
- research
- osint
identifiers:
- type: doi
value: 10.1007/978-981-15-0146-3_19
license: GNU Public License
reposiory-code: https://github.com/DedSecInside/TorBot
title: TorBot - Open Source Intelligence Tool for Dark Web
date-released: 2020-01-30
GitHub Events
Total
- Create event: 7
Last Year
- Create event: 7
Dependencies
.github/workflows/flake8.yml
actions
- actions/checkout v3 composite
- actions/setup-python v3 composite
.github/workflows/pylint.yml
actions
- actions/checkout v2 composite
- actions/setup-python v2 composite
poetry.lock
pypi
- altgraph 0.17.2
- anyio 4.0.0
- beautifulsoup4 4.11.1
- certifi 2023.7.22
- charset-normalizer 2.0.12
- decorator 5.1.1
- exceptiongroup 1.1.3
- h11 0.14.0
- httpcore 0.18.0
- httpx 0.25.0
- idna 3.3
- igraph 0.10.6
- joblib 1.2.0
- macholib 1.16
- numpy 1.24.4
- pefile 2023.2.7
- phonenumbers 8.13.22
- progress 1.6
- pyinstaller 5.13.0
- pyinstaller-hooks-contrib 2022.7
- pysocks 1.7.1
- python-dotenv 0.20.0
- pywin32-ctypes 0.2.2
- scikit-learn 1.3.0
- scipy 1.10.0
- setuptools 68.2.2
- six 1.16.0
- sklearn 0.0
- sniffio 1.3.0
- socksio 1.0.0
- soupsieve 2.3.2.post1
- tabulate 0.9.0
- termcolor 1.1.0
- texttable 1.6.4
- threadpoolctl 3.1.0
- treelib 1.7.0
- unipath 1.1
- urllib3 1.26.17
- validators 0.20.0
- yattag 1.14.0
pyproject.toml
pypi
- PySocks 1.7.1
- altgraph 0.17.2
- beautifulsoup4 4.11.1
- certifi 2023.7.22
- charset-normalizer 2.0.12
- decorator 5.1.1
- httpx ^0.25.0
- idna 3.3
- igraph 0.10.6
- joblib 1.2.0
- macholib 1.16
- numpy 1.24.4
- phonenumbers ^8.13.22
- progress 1.6
- pyinstaller 5.13.0
- pyinstaller-hooks-contrib 2022.7
- python >=3.9,<=3.11.4
- python-dotenv 0.20.0
- scikit-learn 1.3.0
- scipy 1.10.0
- six 1.16.0
- sklearn 0.0
- soupsieve 2.3.2.post1
- tabulate ^0.9.0
- termcolor 1.1.0
- texttable 1.6.4
- threadpoolctl 3.1.0
- treelib ^1.6.1
- unipath ^1.1
- urllib3 1.26.17
- validators 0.20.0
- yattag 1.14.0
requirements.txt
pypi
- altgraph ==0.17.2
- anyio ==4.0.0
- beautifulsoup4 ==4.11.1
- certifi ==2023.7.22
- charset-normalizer ==2.0.12
- decorator ==5.1.1
- exceptiongroup ==1.1.3
- h11 ==0.14.0
- httpcore ==0.18.0
- httpx ==0.25.0
- idna ==3.3
- igraph ==0.10.6
- joblib ==1.2.0
- macholib ==1.16
- numpy ==1.24.4
- pefile ==2023.2.7
- phonenumbers ==8.13.22
- progress ==1.6
- pyinstaller ==5.13.0
- pyinstaller-hooks-contrib ==2022.7
- pysocks ==1.7.1
- python-dotenv ==0.20.0
- pywin32-ctypes ==0.2.2
- scikit-learn ==1.3.0
- scipy ==1.10.0
- setuptools ==68.2.2
- six ==1.16.0
- sklearn ==0.0
- sniffio ==1.3.0
- socksio ==1.0.0
- soupsieve ==2.3.2.post1
- tabulate ==0.9.0
- termcolor ==1.1.0
- texttable ==1.6.4
- threadpoolctl ==3.1.0
- treelib ==1.7.0
- unipath ==1.1
- urllib3 ==1.26.17
- validators ==0.20.0
- yattag ==1.14.0