/onionscan

Onionscan in a Docker container

MIT LicenseMIT

OnionScan

OnionScan in a Docker container Based on https://github.com/s-rah/onionscan.

The purpose of this tool is to make you a better onion service provider. You owe it to yourself and your users to ensure that attackers cannot easily exploit and deanonymize.

Run the container like so:

docker run -d --cap-drop=all --name onionscan mpatton/onionscan

This will startup the Tor connection and allow you to do the following:

docker exec -it onionscan onionscan <options> <onion address>

See https://github.com/s-rah/onionscan for further information.


Note: Run the following to make sure Tor has fully started, prior to running your scan:

docker logs -f onionscan

For a bash function to automate the process of pulling and starting the onionscan daemon container add the following to your .bashrc:

function onionscan(){
	onionscanrunning=$(docker inspect --format "{{.State.Running}}" onionscan 2>/dev/null)
	if [ "$onionscanrunning" == "true" ]
	then
		docker exec -it onionscan onionscan $@
	else
		docker rm $(docker ps -a | grep "onionscan" | cut -d " " -f1)
		docker run -d --cap-drop=all --name onionscan mpatton/onionscan
		docker exec -it onionscan onionscan $@
	fi
}

Using the above function will allow you to run onionscan as if it were installed natively. Now you can simply use the following syntax in a terminal:

onionscan <options> <onion address>