The Android DarkNet Server project is an Android application designed to integrate Tor and a simple web server, enabling the device to host a hidden service accessible through the Tor network. This project serves as a boilerplate intended for developers who need a basic framework to quickly set up a hidden service on Android. It is not intended for production use and is solely for developers looking to build upon this foundation for their own projects.
Before you can actually use it, you'll need to compile the latest Tor packages yourself—just to keep things interesting! 😉 After all, we want to make sure you're using the most up-to-date .so files. So, roll up your sleeves and get compiling. Remember, we don’t make it too easy for you—after all, this is for developers only, and not for criminals and script kiddies!
DarkWeb/
├── src/
│ ├── com/darkwebapp/darkweb/
│ │ ├── MainActivity.java
│ │ ├── TorService.java
│ │ └── WebServer.java
├── assets/
│ └── tor/
└── res/
└── layout/
└── activity_main.xml
-
Tor Integration
- Start the Tor service.
- Configure Tor for the hidden service.
- Monitor the Tor status.
-
Web Server Integration
- Start a simple web server using NanoHTTPD.
- Serve content via the web server.
-
User Interface
- Start and stop Tor and the web server via the UI.
- Display the status of Tor and the web server.
- Show the .onion address of the hidden service.
Before you begin, ensure you have met the following requirements:
- Android Studio installed.
- Android NDK (Native Development Kit) installed.
-
Clone the repository:
git clone https://github.com/yourusername/Android-DarkNetServer.git
-
Import the project into Android Studio: Open Android Studio and select "Open an existing Android Studio project". Navigate to the directory where you cloned the repository and open it.
-
Set up the environment:
- Install the Android NDK:
sudo apt-get install android-ndk
- Install other necessary packages:
sudo apt-get install build-essential automake libtool
- Configure the Android NDK environment variables as per the instructions in
todo.md
.
- Install the Android NDK:
-
Compile the Tor source code for Android:
- Follow the instructions in
todo.md
to compile the Tor binaries for Android.
- Follow the instructions in
-
Build and run the app: Compile your Android project in Android Studio and test the APK on your Android device.
This boilerplate is designed to help developers quickly create hidden servers for pentesting tools or other hidden services. With this boilerplate, you can host advanced hidden services using servers like NanoHTTPD or other alternatives.
Important: This boilerplate is intended for educational and development purposes only. Misuse of this tool for illegal activities is strictly prohibited. Developers should ensure they comply with all local laws and regulations when using this tool.
Feel free to fork this repository and contribute to its development! If you have suggestions for new features or improvements, please submit a pull request.
This project is licensed under the CC4 License.
S.Volkan Kücükbudak
This project was initiated to explore the possibilities of hosting hidden services on Android devices. It's an ongoing effort with more features and improvements planned for the future.