DedSecInside/TorBot
TorBot is an open-source intelligence (OSINT) tool designed for automated reconnaissance on the dark web. It crawls Tor hidden services and .onion domains to gather and analyze data including page titles, hostnames, site descriptions, and link structures. The tool builds visual link tree representations showing relationships between discovered sites, making it easier to map dark web infrastructure during security research. TorBot supports configurable crawl depth to control scope, live status checking to verify whether discovered links remain accessible, and data export in JSON or tree formats. It can also crawl clearnet websites when needed. The tool routes traffic through a SOCKS5 proxy (defaulting to Tor on port 9050) for anonymized requests, with an option to disable the proxy for direct HTTP connections. Deployment is flexible โ it runs in a Python virtual environment with pip or via Docker containers with optional Tor network integration. TorBot is written in Python and is widely used by security researchers, OSINT analysts, and digital forensics professionals for dark web investigations and threat intelligence gathering.
git clone https://github.com/DedSecInside/TorBot.git
Quick Start Example
# Install and run TorBot
python -m venv torbot_venv
source torbot_venv/bin/activate
pip install -r requirements.txt
pip install -e .
# Crawl an onion site with depth 2
python torbot -u http://example.onion --depth 2 --save json
# Visualize link tree structure
python torbot -u http://example.onion --visualize tree
# Get basic site info
python torbot -u http://example.onion -i
# Crawl without Tor proxy (clearnet)
python torbot -u https://example.com --disable-socks5