LinuxCommandLibrary

onionsearch

searches Tor hidden service search engines for content

TLDR

Search onion sites

$ onionsearch "[query]"
copy
Search specific engine
$ onionsearch -e [ahmia] "[query]"
copy
Use Tor proxy
$ onionsearch --proxy [127.0.0.1:9050] "[query]"
copy
Set timeout
$ onionsearch --timeout [30] "[query]"
copy
Limit results
$ onionsearch --limit [50] "[query]"
copy
Output to file
$ onionsearch -o [results.txt] "[query]"
copy

SYNOPSIS

onionsearch [-e engine] [--proxy host:port] [--limit n] [options] query

DESCRIPTION

onionsearch searches Tor hidden service (.onion) search engines for content. It aggregates results from multiple dark web search engines.
Multiple search engines are supported including Ahmia, Torch, and others. Results are collected and deduplicated.
Proxy configuration connects through Tor for anonymous searching. Without Tor, many engines won't be accessible.
Results include onion URLs and page titles. Output formats support further analysis.

PARAMETERS

-e, --engine NAME

Search engine to use.
--proxy HOST:PORT
Tor proxy address.
--timeout SECONDS
Request timeout.
--limit N
Maximum results.
-o, --output FILE
Output file.
--len
Show result count only.
--list
List available engines.
-v, --verbose
Verbose output.

CAVEATS

Requires Tor running for full functionality. Search engines may be unreliable. Results may include illegal content. Use responsibly for security research only.

HISTORY

onionsearch was created for security researchers needing to search dark web content. It provides OSINT capabilities for threat intelligence gathering.

SEE ALSO

tor(1), torsocks(1), proxychains(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community