#Purpose Onion Scanner is a simple TOR Domain scanner. It has the ability to scan .onion domains from a list (with one domain per line) or, if no list is provided, it will scan all the links provided by Yet Another Tor Directory (YATD).
|i||input||string||No||File to read URLs from|
|o||output||string||Yes||Directory to write lists to|
|u||proxyurl||string||No||The URL for the HTTP Proxy to get to TOR [use privoxy]|
|p||proxyport||int||No||The port number for the HTTP Proxy to get to TOR [use privoxy]|
|s||save||bool||No||If set saves bad and seized links as well|
|d||desc||bool||No||If set saves site title with URLs|
|a||agent||string||No||The User-Agent to emulate|
|n||numlinks||int||No||Number of links to scan [0=all]|
#Setup Since Onion Scanner currently has no method of utilizing a SOCKS5 proxy, it relys on some kind of HTTP proxy that has the ability to forward all traffic to TOR. The best proxy I have found to do the job is Privoxy.
In order to use privoxy with TOR you must first install Privoxy. Next edit the config file and search for the line
# forward-socks5 / localhost:9050 .
Uncomment this line and change the Port Number to whatever port TOR uses, now just configure a browser to use privoxy via HTTP Proxy to see if it's working. You can check over at TORCheck.
By default Onion Scanner uses port number 8118 and the url 127.0.0.1 to connect to privoxy. You can change this using the -u and -p parameters respectively.
#Usage Once you have Onion Scanner setup, you can now run it using the paramters provided in the "Options" section. If you have a list of .onion URLs that you would like to scan, simply feed it into the program using the -i option. Just ensure that there is only 1 URL per line.
If you do not have a list of URLs, Onion Scanner will grab all the URLs from YetAnotherTorDirectory and check them. It could take quite some time since (at the time of this writing) there are well over 8k URLs.