Pidrila – Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is seriously rapid async internet path scanner prototype made by BrightSearch workforce for all ethical netstalkers.
Set up & Utilization
git clone https://github.com/enemy-submarine/pidrila.git
cd pidrila
python3 pidrila.py -u
Alternatives
Usage: pidrila.py [OPTIONS]
Possibilities:
-U, --user-agent Textual content Consumer-Agent
-t, --timeout INTEGER Ask for timeout [default: 30]
-A, --auth Text Essential HTTP auth, i.e. login:password
-M, --max-connections-per-host INTEGER
How a lot of simultaneous connections ought to we
open up (per every host) [default: 16]
-m, --max-connections INTEGER How many simultaneous connections should really we
open up [default: 128]
-p, --proxy Textual content Proxy address, like socks5h://127...1:9050
-p, --pathlist FILENAME Route list
-L, --url-record FILENAME Concentrate on URL record
-u, --url Text Goal URL, option is mutually special
with url_listing [required]
-l, --logs Directory Vacation spot listing for the logs
--http-strategy [head|get] HTTP approach: GET or HEAD [default: get]
--assistance Exhibit this message and exit.
Characteristics
- Asynchronous
- Can simultaneously scan limitless range of web sites
- Retain-alive aid
- HTTP and SOCKS proxy guidance
- Person agent randomization
Utilization examples
Scan one clearweb web-site
python3 ./pidrila.py -u http://silenthouse.yoba -M 128
Scan single onion web-site
python3 ./pidrila.py -u http://zqktlwi4fecvo6ro.onion -m 16 -M 16 --proxy=socks5h://127...1:9050
Fast batch scan with customized User-Agent
python3 ./pidrila.py -m 2048 -L darkweb_internet sites_record.txt --person-agent "Pantusha/2. (4.2BSD)"