LiveIndex-OSINT is a powerful open-source dark web crawler and intelligence toolkit for .onion sites. Unlike typical scrapers, this system actively discovers, indexes, and analyzes live onion services, capturing metadata and PGP keys in real time — all accessible through a clean Web UI dashboard.
✅ Crawls .onion sites via Tor (using SOCKS5)
✅ Extracts page metadata (title, description, HTTP status)
✅ Identifies and saves PGP public/private key blocks
✅ Discovers new onions from visited pages
✅ Stores results in SQLite & JSONL logs
✅ Includes a Flask-based Web UI for browsing, searching, and filtering onions
✅ Smart deduplication — skips already-indexed sites
✅ Designed for OSINT workflows and dark web research
| Feature | LiveIndex-OSINT | Traditional Crawlers |
|---|---|---|
| 🚪 Onion Routing | ✅ Full Tor Proxy Support | ❌ Usually Clear-Net Only |
| 🔐 PGP Key Extraction | ✅ Extracts & Indexes Keys | ❌ No Support |
| 📚 Live Metadata Indexing | ✅ Title, Desc, Status | |
| 🔄 Recursive Discovery | ✅ From directories & pages | ❌ Static seed-based |
| 🖥️ Integrated Web UI | ✅ Search & Dashboard | ❌ CLI Only |
| 📈 Active vs Inactive Detection | ✅ Tracked & Split | ❌ No Health Checks |
| 🧩 OSINT Ready | ✅ Structured DB + JSON | ❌ Unstructured Dumps |
- Clone the Repo
git clone https://github.com/TheGodRX/LiveIndex-OSINT.git
cd LiveIndex-OSINT- Install Dependencies
Make sure you're using Python 3.9+.
sudo apt install sqlite3
sudo apt install libsqlite3-dev
pip install -r requirements.txt- Start Tor
Ensure Tor is running locally (default SOCKS5: 127.0.0.1:9050)
# Debian/Ubuntu
tor
sudo service tor start- Run the Crawler
python indexer.pyLet it run in the background. It will automatically:
- Load seed onion directories
- Crawl & index live .onion pages
- Log metadata and discovered onions
- Extract embedded PGP key blocks
- Store everything to
onions2.dband JSONL files
- Launch the Web Dashboard -In a new tab or terminal window run..:
python webUI.py- Access the UI
Open your browser and go to:
http://localhost:3000
- View & search indexed
.onionlinks - Filter by live/dead status
- Read extracted PGP keys
- Explore full metadata for each domain
- Export results for further OSINT investigation
- Host as a hidden service
| File | Description |
|---|---|
onions2.db |
SQLite DB with all indexed results |
out.jsonl |
All scan logs (one JSON per line) |
active_onions.jsonl |
Live .onion pages |
inactive_onions.jsonl |
Dead/unreachable sites |
httpx_socksfor Tor over SOCKS5asynciofor concurrent crawlingsqlite3for lightweight storageFlaskfor the Web UIrefor regex-based PGP and onion detection
The crawler looks for GPG/PGP blocks like:
-----BEGIN PGP PUBLIC KEY BLOCK-----
...
-----END PGP PUBLIC KEY BLOCK-----
These are stored and searchable through the Web UI — ideal for tracking actor identities, crypto wallets, or hidden forums.
- Dark web monitoring & intelligence
- Threat actor tracking (PGP reuse)
- Crawling decentralized marketplaces
- Academic research on hidden services
- Live domain monitoring & OSINT archiving
In addition to indexing .onion sites and their metadata, LiveIndex-OSINT includes a PGP Key Match Daemon — a continuously running script that monitors your SQLite database (onions2.db) and identifies any reused PGP keys across different dark web sites.
- Watches the database in real time for new entries with PGP key blocks
- Matches identical PGP keys reused across different
.onionURLs - Outputs a clean and readable OSINT report in
pgp_matches.txt - Includes the full PGP key, matching URL list, and site titles
- Helps correlate hidden services that may be operated by the same entity
- 🧠 Uncovers operational links between threat actors or marketplaces
- 🔁 Runs continuously, always monitoring for new PGP reuse
- 📄 Generates human-readable reports with structured key and site data
- 🕵️♂️ Perfect for OSINT analysts, journalists, or law enforcement mapping onion ecosystems
Used by 3 onion site(s) Key Fingerprint (SHA-256): 8a7c6f9e92f6cbde66c5bd3f4f716b4be1d99d5ddbe63e9e92b69e56e25d8a24
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: OpenPGP.js v4.10.10
xsBNBFmABCABC... ... -----END PGP PUBLIC KEY BLOCK-----
🧭 Associated .onion URLs:
- http://marketxyz.onion | "XYZ Market"
- http://securechatxyz.onion | "Secure Drop Alpha"
- http://unknownforum77.onion | "(No Title Found)"
This script empowers deep linkage analysis of hidden services based on cryptographic reuse — a vital tool in modern darknet OSINT workflows.
Open a new terminal (while indexer.py is running) and execute:
python pgp_match_daemon.py
This tool is for educational and lawful OSINT research only. Do not use it to access illegal content. You're responsible for ensuring compliance with your jurisdiction’s laws.
Author: TheGodRX
DM via GitHub or submit issues via the Issues tab
DONATE XMR TO: 42uJeqTHZbgVhrGvkjBTRTMTavgNQSVJ64YLVGdiPMuP4s3zdXv6rr5HSSVo7yvDACPtXv9bdZ554Hf1rstvzL4sEgSVeT9 DONATE BTC TO: 34SJhbCJAjMB9NpXxXiKBR7BAGNQFrKgFN
Give it a star 🌟 — it helps boost visibility and supports development!