Abstract
This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool allows users to input search queries, clean them for web compatibility, and display the results in real time. Additionally, the application provides graphical insights into the search results by generating visual data representations using matplotlib. This paper discusses the architecture, development process, and functionality of the tool, providing a new method for researchers to explore the TOR network.