"Because sometimes you gotta know what's lurking in the shadows"
TL;DR: A sleek web app that lets you monitor the dark web for cybersecurity threats. Built with Python + Streamlit, connects through Tor, and looks absolutely fire 🔥
Ever wondered what cybercriminals are chatting about? This tool helps cybersecurity researchers and students monitor dark web sites for:
- 💀 Data breach discussions
- 🏴☠️ Ransomware activity
- 🎭 Identity theft markets
- 🔐 Stolen credentials chatter
- 🚨 General cyber threat intelligence
Legal disclaimer: This is 100% for educational/research purposes. Don't be that person who uses this for sketchy stuff 😤
🎨 Modern UI - None of that 2010 terminal BS. Beautiful purple gradients and smooth animations
🧅 Tor Integration - Auto-connects through Tor (because privacy matters)
🔍 Smart Scraping - Monitors legit .onion sites only (DuckDuckGo, Facebook, etc.)
📊 Real-time Dashboard - Live metrics, charts, and progress bars
💾 Data Export - CSV exports for all your findings
⚡ Zero Config - Pre-loaded with 30+ keywords and 12 target sites
git clone https://github.com/yourusername/darksearch.git
cd darksearch
pip install -r requirements.txtstreamlit run main.pyNavigate to http://localhost:8501 and boom 💥 You're in!
The interface is actually gorgeous - modern purple gradients, smooth animations, and a cyberpunk vibe that just hits different
- Home Page - Check your dashboard metrics and recent activity
- Configure - Add keywords you wanna monitor (already got 30 loaded)
- Scan - Hit that scan button and watch the magic happen
- Results - View findings, export to CSV, analyze patterns
- Analytics - Fancy charts because data visualization is chef's kiss 👌
- Backend: Python 3.8+ (requests, BeautifulSoup, pandas)
- Frontend: Streamlit with custom CSS (those gradients tho 🌈)
- Networking: SOCKS5 proxy through Tor
- Data: CSV storage (keeping it simple)
- Security: Everything runs locally (your data stays yours)
Hit the "Configuration" tab and add whatever terms you're tracking:
"zero-day exploit", "corporate breach", "leaked database"
Drop new .onion URLs in the target sites list. Stick to public/legal ones obvs.
One-click CSV export. Import into Excel, Tableau, or whatever floats your boat.
Real Talk: This tool is designed for:
- ✅ Cybersecurity research
- ✅ Academic studies
- ✅ Threat intelligence gathering
- ✅ Educational purposes
Hard No's:
- ❌ Illegal activities
- ❌ Accessing private/illegal content
- ❌ Harassment or stalking
- ❌ Anything that breaks laws
We only scrape PUBLIC sites that are already indexed. Think of it like Google but for the dark web's public square.
Tor connection failed?
- Hit the "Auto-Connect to Tor" button
- Make sure Tor Browser is installed
- Check if your VPN is blocking Tor
App won't start?
pip install --upgrade streamlit
streamlit run main.py --server.port 8502Scans not working?
- Check your internet connection
- Some .onion sites are just down (it happens)
- Try different keywords
Found a bug? Got ideas? PRs are welcome! Just:
- Fork it
- Create a feature branch
- Make your changes
- Submit a PR with a decent description
MIT License - do whatever you want, just don't blame me if something breaks 🤷♂️
Shoutout to:
- Streamlit team for making web apps stupid easy
- Tor Project for keeping the internet free
- Coffee ☕ for keeping me awake during late-night coding sessions
- Issues & Bugs
- Feature Requests
- My Twitter (for updates and memes)
Built with 💜 by a cybersecurity student who got tired of ugly terminal tools
P.S. - If this helped your research, drop a ⭐ on the repo. It literally costs nothing but means everything to developers like me!
This tool is for educational and research purposes only. Use responsibly, follow your local laws, and don't be a script kiddie. The cybersecurity community is about protection, not exploitation.
Stay safe out there! 🛡️✨