Just wanted to share this because its so cool
Ive been fucking around on tor deepwebs for shits and giggles.
Wrote miniature command to just download the plain html and cat it to a file.
The torsites_clean file is nothing but a very long list of onion websites.
Such lists can be easily compile from this for example:
http://bdpuqvsqmphctrcs.onion/noscript.htmlwhile read p; do
proxychains curl $p >> torhtml.t
done < torsites_clean
Result is garbage and looks something like this:
ond.">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
<link rel="stylesheet" href="style.css">
<link rel="shortcut icon" href="favicon.ico">
</head>
<body>
<div class="sha" id="acontain">
<div class="grd" id="head">
onion soup
</div>
<div id="ccontain">
<div id="blog">
<p>
<span class="tshat">Welcome to my onion blog.</span>
The subjects covered will be diverse, but the main focus will be on criticizing the break-down of rationality in US politics.
</p>
<p>
On the right and on this <a href="links.html">page</a> are collections of links to onion sites. Immediately below, there's an <a href="#sniff">app</a> to test the connectivity of onion domains running on port 80. Sometimes - if you're on a lagging connection, an onion domain will time out, and an error message received. With this app, you can test the availability of onion domains from <em>this</em> server as well.
</p>
<a id="sniff"></a>
<div class="gra" id="check">
<form enctype="multipart/form-data" method="POST" action="/cgi-bin/check.fcgi">
<p class="y">
onion sniffer
</p>
<p class="z">
<input required type="text" maxlength="22" name="host" class="inputa" value="">
</p>
<p class="z">
<input type="submit" name="Submit" class="button" value="test">
</p>
</form>
</div>
<a id="serv"></a>
<p>
<strong>By request</strong>, here's a new tool. To query a broader range of <em>advertised</em> services - bound to an onion hostname, use the drop-down list in the right hand section of the app.
</p>
<div class="gra" id="check1">
<form enctype="multipart/form-data" method="POST" action="/cgi-bin/sniff.fcgi">
<p class="y">
serv sniffer
</p>
<p class="z">
Also , dont read this ^ you just wasted valuable seconds of being a human being.
This got me thinking because it would be fun to extract the urls and scrape those aswel such as a real scraper would do.
Basically infinite linkdept and just record the urls that are alive etc.
Whatever , if anyone got some kewl ideas just drop m here, this is just for phun.