A comprehensive tool for analyzing Tor hidden services (.onion sites) with enhanced testing capabilities and detailed result reporting.
- π― Simple Execution: Easy-to-use Makefile commands
- π Web Dashboard: Beautiful results viewer with charts and statistics
- π Independent Services: Separate analysis and viewer containers
- π§ͺ Built-in Testing: Connectivity tests and validation
- π Multiple Targets: Analyze multiple .onion addresses
- π Demo Mode: Test without Tor using demo data
- Docker and Docker Compose
- For local development: Python 3.8+ and Tor daemon
make analyze
make viewer
# Open http://localhost:8080
make run
make help # Show all available commands
make build # Build Docker image
make analyze # Run analysis only
make viewer # Start results viewer only
make run # Run analysis + start viewer
make test # Quick test with sample URL
make demo # Run demo without Tor
make logs # Show analyzer logs
make stop # Stop all services
make clean # Clean up everything
pip install -r src/requirements.txt
# macOS
brew install tor && tor
# Ubuntu/Debian
sudo apt install tor && sudo systemctl start tor
cd results
python3 server.py 8080
# Open http://localhost:8080
π tor-analyzer: Runs Tor network analysis and generates reports
π results-viewer: Serves web interface for viewing results
Benefits:
- Run analysis independently without starting the web viewer
- View existing results without running new analysis
- Scale each component separately
- Target URLs: Edit
src/assets/collect_target_address.txt
- Proxy Settings: Modify
src/analyzer.py
if needed - Analysis Parameters: Configure in
main.py
The web interface provides:
- π Analysis Results with success rates and response times
- π Performance Charts for all analysis runs
- π Auto-refresh functionality
- π± Responsive design for all devices
- π Historical Data from previous analyses