https://github.com/volkansah/sherlockshome
This Black Python script is not a game! It is a powerful tool to monitor the traffic between clients and malicious .onion sites. We use a code like this to capture bad actors
https://github.com/volkansah/sherlockshome
black-python destination hacking-tool hacking-tools hidden-service hidden-services onion redteam-tools sniffer sniffing target-tracking targets tor tor-hacking tracking
Last synced: 3 months ago
JSON representation
This Black Python script is not a game! It is a powerful tool to monitor the traffic between clients and malicious .onion sites. We use a code like this to capture bad actors
- Host: GitHub
- URL: https://github.com/volkansah/sherlockshome
- Owner: VolkanSah
- License: mit
- Created: 2023-04-26T21:02:29.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-21T22:54:31.000Z (over 1 year ago)
- Last Synced: 2025-04-11T18:03:39.962Z (8 months ago)
- Topics: black-python, destination, hacking-tool, hacking-tools, hidden-service, hidden-services, onion, redteam-tools, sniffer, sniffing, target-tracking, targets, tor, tor-hacking, tracking
- Language: Python
- Homepage: https://github.com/VolkanSah/SherlocksHome/
- Size: 1.3 MB
- Stars: 6
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# SherlocksHome - Get all Bastards! (EDU)
A Python script to monitor traffic forwarded from `.onion` sites via local ports. Designed **for educational and security research purposes only**.
> ⚠️ **Warning**
> This tool is for security professionals and developers. Misuse may lead to legal consequences. Use responsibly.
> ⚠️ **Important**
> Please note that there are pre-steps (e.g., SoCat) you must complete before using this script. I will **not disclose them** to prevent malicious individuals from misusing this tool. Attempting to use it without proper setup may harm yourself and could lead to legal consequences.
## Features
* Capture TCP traffic on local ports forwarded from `.onion` sites.
* Log timestamps, source IP, destination IP, and protocol.
* Export captured data to CSV for analysis.
* Detect potential intruders based on suspicious local connections.
## Usage
1. Update the script with the local port or `.onion` address you want to monitor.
2. Run the script:
```bash
python sherlocks_home.py
```
3. Analyze the CSV output for traffic insights.
## Disclaimer
This project is **educational only**. Never use it for illegal, unethical, or malicious activities. The author is not responsible for misuse or damages.
## License
MIT License – See the [LICENSE](LICENSE) file for details.
### Copyright
[Volkan Sah](https://github.com/volkansah)