🦹
CYBERSECURITY BOOK
CtrlK
  • 👽CS && PEN-TESTING BOOK
    • 🔍Reconnaissance
    • 🔢Enumeration
    • ☮️Public Exploits
    • 🕎Vulnerability Scanning
    • 🕳️Tunneling & Exfiltration
    • Backdoors
    • 🌠Exploiting VPNs
    • 🎣Pivoting (Post Exploitation)
    • 🎯Active Directory Pentesting
    • 🐳Docker
    • ☸️Kubernetes
    • 🙅‍♂️Social Engineering
    • 🗺️CEH Mindmaps
    • 🗾CND Mindmaps
    • 👿Vulnerability Research
    • 📶Network Security
    • 🛂Port Forwarding
    • 👾API Testing
    • 🕸️Web App Pentesting Notes
    • 🛩️Wireless Hacking
    • 🏁CEH Engage Walkthroughs
    • 🎃Evasion
    • 🚪Post exploitation
    • 🔓Hashing & Password Cracking
    • 📒Hacking Cheat Sheets
    • 🏇CEH Practical
    • ☁️Cloud Pentesting
    • 🪟Windows Security
    • 🐧Linux Security
    • 🍎MacOS Security
    • 📱Android Security
    • 🍎iOS Security
    • 🧾Scripting
    • 🐉Reverse Engineering & Malware Analysis
    • 🌠Protocol Exploitation
    • 🛜Network Pentesting
    • 👮Digital Forensics & Incident Response
      • 📩Email Forensics
      • 💸Ransomware Forensics
      • 💱Blockchain Forensics
      • 📝Memory Forensics
      • ☄️Network Forensics
      • 🪟Windows Forensics
      • 📼Media Forensics
      • 🧙Forensic Imaging
      • 🪅Data Collection
      • 🔏Privacy Research
        • Deanonymization - TOR Hidden Services
        • Deanonymization - Flash Code
        • Dark Web - OSINT
        • Dark Web Investigation
      • 🕸️Web Investigations
      • 🏴‍☠️Threat Detection
    • 🦋Cisco Attacks
    • 🐼CVE's
    • 🐛OWASP TOP 10
    • 🛼Web 3 Vulnerabilities
    • 🛩️Web 3 Smart Contract
    • 🌃Smart Contract Audits
    • 👩‍💼GRC Frameworks
  • 🦹REAL WORLD && CTF
  • 🦸MISCELLANEOUS
  • 🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH
  • 👾THREAT HUNTING - RESEARCH
  • 🦅CISA - INCIDENT RESPONSE PLAYBOOK
Powered by GitBook
On this page
  • Dark Web Search Engines
  • Scanning Onion Addresses
  • REFERENCES

Was this helpful?

Edit
  1. 👽CS && PEN-TESTING BOOK
  2. 👮Digital Forensics & Incident Response
  3. 🔏Privacy Research

Dark Web Investigation

Dark Web Search Engines

  • Ahmia - http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/

  • Heystack - http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/

  • Torch - http://xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion/

  • Duck Duck Go - https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/

  • The Hidden Wiki - http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/

  • Tor Links - http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/

  • Archive Today - http://archiveiya74codqgiix​o33q62qlrqtkgmcitqx5​u2oeqnmn5bpcbiyd.onion/

Scanning Onion Addresses

  • Censys: https://censys.com/

Revealing the real IP address of a hidden service


REFERENCES

  • https://www.expressvpn.com/blog/best-onion-sites-on-dark-web/

PreviousDark Web - OSINTNextWeb Investigations

Last updated 1 year ago

Was this helpful?