{"id":2049,"date":"2025-06-13T19:17:36","date_gmt":"2025-06-13T17:17:36","guid":{"rendered":"https:\/\/www.elvigilantedigital.com\/?p=2049"},"modified":"2025-06-13T19:21:13","modified_gmt":"2025-06-13T17:21:13","slug":"guia-practica-herramientas-open-source-para-explorar-y-monitorear-la-dark-web","status":"publish","type":"post","link":"https:\/\/www.elvigilantedigital.com\/en\/2025\/06\/13\/guia-practica-herramientas-open-source-para-explorar-y-monitorear-la-dark-web\/","title":{"rendered":"Practical Guide: Open Source Tools for Exploring and Monitoring the Dark Web"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2049\" class=\"elementor elementor-2049\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56f13602 e-flex e-con-boxed e-con e-parent\" data-id=\"56f13602\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-180c8112 elementor-widget elementor-widget-text-editor\" data-id=\"180c8112\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La <strong>Dark Web<\/strong> es un espacio donde se intercambian datos robados, herramientas de hacking y se discuten t\u00e1cticas criminales. Para profesionales de ciberseguridad y analistas de inteligencia, conocerla es fundamental. Aqu\u00ed tienes una <strong>gu\u00eda paso a paso<\/strong> con las principales <strong>herramientas open source de GitHub<\/strong> que te permitir\u00e1n <strong>investigar, monitorizar y analizar la Dark Web<\/strong>, de forma \u00e9tica y legal.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">1. OnionScan \u2013 Auditor\u00eda y an\u00e1lisis de servicios .onion<\/h2>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Un esc\u00e1ner poderoso para investigar sitios ocultos en Tor, detectando vulnerabilidades como SSL expirado, cabeceras peligrosas, subdominios, fallos de configuraci\u00f3n, entre otros.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>\u2b50 M\u00e1s de 3\u202f000 estrellas en GitHub <a href=\"https:\/\/github.com\/s-rah\/onionscan?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">rapid7.com+15github.com+15cm-alliance.com+15<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Ideal para auditores que quieren verificar la seguridad de un servicio .onion.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Funcionalidades:<!-- wp:list --><br \/>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Divisi\u00f3n por categor\u00edas de errores.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Exportaci\u00f3n de resultados en JSON.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Protocolo de reporte autom\u00e1tico.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:image {\"id\":2051,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"888\" height=\"490\" class=\"wp-image-2051\" src=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/onionscan.jpg\" alt=\"\" srcset=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/onionscan.jpg 888w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/onionscan-300x166.jpg 300w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/onionscan-768x424.jpg 768w\" sizes=\"(max-width: 888px) 100vw, 888px\" \/><\/figure>\n<p><!-- \/wp:image --><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">2. TorBot \u2013 Motor de b\u00fasqueda y crawling en Dark Web<\/h2>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Automatiza la b\u00fasqueda y rastreo de enlaces .onion, accediendo a foros clandestinos y recopilando datos en carpetas estructuradas.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Integrado con motores especializados como OnionSearch, Darkdump o Ahmia <a href=\"https:\/\/github.com\/hoodietramp\/capNcook?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">github.com+1github.com+1<\/a><a href=\"https:\/\/github.com\/apurvsinghgautam\/dark-web-osint-tools?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">en.wikipedia.org+3github.com+3socradar.io+3<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Captura enlaces, contenido HTML, metadatos.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:image {\"id\":2052,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"842\" height=\"297\" class=\"wp-image-2052\" src=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/torbot.jpg\" alt=\"\" srcset=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/torbot.jpg 842w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/torbot-300x106.jpg 300w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/torbot-768x271.jpg 768w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/figure>\n<p><!-- \/wp:image --><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">3. Inspy \u2013 Crawler avanzado y capturador de im\u00e1genes<\/h2>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Desarrollado en Python y optimizado para entornos OSINT:<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Rastrear enlaces .onion.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Capturar pantallazos de p\u00e1ginas.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Extraer headers HTTP y contenidos multimedia<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:image {\"id\":2053,\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} --><\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-image-2053\" src=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/inspy-1024x512.jpeg\" alt=\"\" srcset=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/inspy-1024x512.jpeg 1024w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/inspy-300x150.jpeg 300w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/inspy-768x384.jpeg 768w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/inspy.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p><!-- \/wp:image --><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">4. dark-web-osint-tools<\/h2>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Un repositorio que recopila m\u00faltiples herramientas clasificadas por funcionalidad:<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Motores de b\u00fasqueda (Katana, OnionSearch, Ahmia).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Crawlers de enlaces.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Scanners (Onionscan, Onion-nmap).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Crawler especializados e ingestores<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li>Combina utilidades para construcci\u00f3n de pipelines OSINT.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:image {\"id\":2054,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"397\" class=\"wp-image-2054\" src=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/spider.jpg\" alt=\"\" srcset=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/spider.jpg 413w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/spider-300x288.jpg 300w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/><\/figure>\n<p><!-- \/wp:image --><!-- wp:separator --><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p><!-- \/wp:separator --><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">\u00bfC\u00f3mo usarse?<\/h2>\n<p><!-- \/wp:heading --><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">a) Preparaci\u00f3n:<\/h3>\n<p><!-- \/wp:heading --><!-- wp:list {\"ordered\":true} --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\"><!-- wp:list-item --><\/ol>\n<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<li>Instala Tor y aseg\u00farate de que funciona (<code>tor.service<\/code>).<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<li>Clona alguno de los repos desde GitHub:\n<pre>git clone https:\/\/github.com\/s-rah\/onionscan.git<\/pre>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">b) Comandos b\u00e1sicos:<\/h3>\n<p><!-- \/wp:heading --><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>OnionScan<\/strong>:\n<pre><code>cd onionscan go build .\/onionscan yourtarget.onion<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>TorBot<\/strong>:<br \/>Personaliza el archivo de configuraci\u00f3n para definir keywords y fuentes surface web.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">c) Flujo de trabajo:<\/h3>\n<p><!-- \/wp:heading --><!-- wp:list {\"ordered\":true} --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\"><!-- wp:list-item --><\/ol>\n<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<li>Escanea el dominio <code>.onion<\/code> con OnionScan.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<li>Usa TorBot o Inspy para crwlear y extraer contenido.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<li>Analiza en local con scripts en Python, revisando listas de archivos, URLs y pantallas.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2 data-start=\"1901\" data-end=\"1932\">Buenas pr\u00e1cticas y \u00e9tica<\/h2>\n<ul data-start=\"1934\" data-end=\"2059\">\n<li data-start=\"1934\" data-end=\"1975\">\n<p data-start=\"1936\" data-end=\"1975\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"14\" data-is-only-node=\"\">Legalmente<\/strong>: solo analiza sitios con fines defensivos o educativos.<\/span><\/p>\n<\/li>\n<li data-start=\"1976\" data-end=\"2017\">\n<p data-start=\"1978\" data-end=\"2017\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"24\" data-is-only-node=\"\">Respeto a privacidad<\/strong>: anonimiza tus herramientas y no compartas datos sensibles.<\/span><\/p>\n<\/li>\n<li data-start=\"2018\" data-end=\"2059\">\n<p data-start=\"2020\" data-end=\"2059\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"22\" data-is-only-node=\"\">Entorno controlado<\/strong>: utiliza m\u00e1quinas virtuales o contenedores para evitar exposici\u00f3n.<\/span><\/p>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La Dark Web es un espacio donde se intercambian datos robados, herramientas de hacking y se discuten t\u00e1cticas criminales. Para profesionales de ciberseguridad y analistas de inteligencia, conocerla es fundamental. Aqu\u00ed tienes una gu\u00eda paso a paso con las principales herramientas open source de GitHub que te permitir\u00e1n investigar, monitorizar y analizar la Dark Web, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[58,56],"tags":[94,97,96,91,95,93,92],"class_list":["post-2049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guias","category-herramientas","tag-dark-web-osint","tag-github-herramientas-osint","tag-herramientas-dark-web-2025","tag-inspy","tag-investigacion-darknet","tag-onionscan","tag-torbot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/comments?post=2049"}],"version-history":[{"count":7,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2049\/revisions"}],"predecessor-version":[{"id":2061,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2049\/revisions\/2061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/media\/2050"}],"wp:attachment":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/media?parent=2049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/categories?post=2049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/tags?post=2049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}