An open API service indexing awesome lists of open source software.

https://github.com/atharvbyadav/ghostpath

πŸ‘» GhostPath β€” A powerful modular reconnaissance toolkit built for hackers, OSINT professionals & bug bounty hunters β€” passive + active recon in a sleek CLI shell. Discover subdomains, probe paths, mine archives and hunt certificates β€” all from one interactive terminal interface.
https://github.com/atharvbyadav/ghostpath

bug-bounty cli-tool commoncrawl cybersecurity ethical-hacking ghostpath hacking historical-data information-gathering infosec osint passive-recon reconnaissance web-recon

Last synced: 2 months ago
JSON representation

πŸ‘» GhostPath β€” A powerful modular reconnaissance toolkit built for hackers, OSINT professionals & bug bounty hunters β€” passive + active recon in a sleek CLI shell. Discover subdomains, probe paths, mine archives and hunt certificates β€” all from one interactive terminal interface.

Awesome Lists containing this project

README

          


GhostPath Logo



GhostPath β€” A Modern Interactive Reconnaissance Toolkit for Hackers & Security Researchers πŸ•΅οΈβ€β™‚οΈ


License
Python
Recon Type
Modules
Focus
Debug
Platform
Status

---

## 🧠 What is GhostPath?

**GhostPath** is a professional-grade CLI reconnaissance toolkit designed for cybersecurity researchers, penetration testers and bug bounty hunters. It provides a modular, extensible and interactive shell to run recon operations in an intuitive and streamlined way.

πŸ’‘ Powered by Python and focused on speed, clarity and results.

---

## ✨ Features

- πŸ” Interactive hacker-style CLI shell
- πŸ”— Passive and active recon modules
- 🧩 Modular architecture with shared utilities
- πŸ“ Output saving in TXT, JSON, CSV
- πŸš€ Multithreaded path probing with live feedback
- 🧾 Certificate transparency & subdomain discovery
- 🌐 Wayback, URLScan and CommonCrawl support
- 🧠 Built-in wordlist fallback & auto-detection
- πŸ”§ `pipx`-installable for global CLI use
- βœ… `--help`, `--version` and `update` command support

---

## πŸš€ Installation (Recommended: pipx)

Use **pipx** for a clean, isolated global installation:

```bash
# Install pipx (if not already)
sudo apt install pipx
pipx ensurepath
source ~/.bashrc # or ~/.zshrc

# Clone and install GhostPath
git clone https://github.com/atharvbyadav/GhostPath.git
cd GhostPath
pipx install .
````

### βœ… Run from anywhere:

```bash
GhostPath
```

---

GhostPath Terminal Banner

---

## 🐍 Running without pipx (Direct Script Mode)

If you prefer not to use pipx, you can run GhostPath directly using Python:

### 1. Clone the repository

```bash
git clone https://github.com/atharvbyadav/GhostPath.git
cd GhostPath
```

### 2. (Optional) Create a virtual environment

> Highly recommended to isolate dependencies.

```bash
python3 -m venv venv
source venv/bin/activate
```

### 3. Install the dependencies

```bash
pip install -r requirements.txt
```

### 4. Run the GhostPath CLI shell

```bash
python3 main_cli.py
```

---

## πŸ’» Usage Overview

Once inside the shell:

```bash
ghostpath> help
```

You’ll see:

```
🧩 Available GhostPath Commands:
timetrail β†’ Fetch historical URLs from archives (Wayback, URLScan, Common Crawl)
domainscope β†’ Discover subdomains & DNS profiling
pathprobe β†’ Actively probe directories and endpoints
certtrack β†’ Get subdomains from public SSL/TLS certs
version β†’ Show current installed version
clear β†’ Clear the screen
help β†’ Show this help menu
exit β†’ Exit GhostPath CLI
```

---

## 🧩 Modules

### πŸ•°οΈ `timetrail`

Fetch historical URLs from:

* Common Crawl *(default)*
* Wayback Machine
* URLScan.io

```bash
timetrail --target example.com
timetrail --target example.com --source wayback --output urls.json --format json
```

---

### 🌐 `domainscope`

Find subdomains and related DNS data.

```bash
domainscope --target example.com
domainscope --target example.com --output domains.txt
```

---

### πŸ“œ `certtrack`

Gather subdomains from SSL/TLS certificate transparency logs.

```bash
certtrack --target example.com
certtrack --target example.com --output certs.csv --format csv
```

---

### πŸ”“ `pathprobe`

Actively probe common paths/endpoints on a web app using HTTP requests.

```bash
pathprobe --target https://example.com
pathprobe --target https://example.com --wordlist lists/path-wordlist.txt --output result.json --format json
```

> If no wordlist is passed, it will fallback to:
> `GhostPath/lists/path-wordlist.txt`

---

## πŸ§ͺ Output Formats

All modules support output saving in:

* βœ… `.txt`
* βœ… `.json`
* βœ… `.csv`

Just pass:

```bash
--output filename --format txt|json|csv
```

---

## πŸ“¦ Version & Self-Update

### Check current version:

```bash
ghostpath> version
```

---

### Reinstall / Update (via pipx):

```bash
pipx reinstall GhostPath
```

---

## πŸ“œ License

```text
BSD 3-Clause License

Copyright (c) 2025, Atharv Yadav
All rights reserved.
```

> πŸ“„ See the [LICENSE](LICENSE) file for full license terms.

---

## 🀝 Contributing

We welcome your pull requests, feature ideas and improvements to make **GhostPath** even better! Here's how to contribute:

1. **Fork** the repository
2. **Clone** your fork locally:

```bash
git clone https://github.com/yourusername/GhostPath.git
cd GhostPath
```
3. **Create a new branch** for your changes:

```bash
git checkout -b feature/your-feature
```
4. Make your changes and **commit**:

```bash
git commit -m "Add: your feature/fix summary"
git push origin feature/your-feature
```
5. Open a **Pull Request** on GitHub πŸ“¬

> Please follow best practices and write clear commit messages πŸ™Œ

---

## πŸ‘¨β€πŸ’» Author

```bash
β”Œβ”€[ Coded with β˜• + ⚑ by Atharv Yadav ]
β”‚
β”œβ”€πŸ› οΈ Creator of GhostPath
β”œβ”€πŸŒ https://github.com/atharvbyadav
β””β”€πŸ“§ uuwr5t1s [at] duck [dot] com
{ _Looks suspicious? Good. It’s mine. The ducks work for me. πŸ¦†πŸ’»_ }
```

> *"I don’t just scan β€” I haunt networks."* πŸ‘»


πŸ”— GitHub: @atharvbyadav

βœ‰οΈ Email Me

---

πŸ•·οΈ GhostPath β€” Stealthy. Modular. Effective.

---