Skip to content

πŸ‘» GhostPath β€” A powerful modular reconnaissance toolkit built for hackers, OSINT professionals & bug bounty hunters β€” passive + active recon in a sleek CLI shell. Discover subdomains, probe paths, mine archives and hunt certificates β€” all from one interactive terminal interface.

License

Notifications You must be signed in to change notification settings

atharvbyadav/GhostPath

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

75 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

GhostPath Logo

GhostPath β€” A Modern Interactive Reconnaissance Toolkit for Hackers & Security Researchers πŸ•΅οΈβ€β™‚οΈ

License Python Recon Type Modules Focus Debug Platform Status


🧠 What is GhostPath?

GhostPath is a professional-grade CLI reconnaissance toolkit designed for cybersecurity researchers, penetration testers and bug bounty hunters. It provides a modular, extensible and interactive shell to run recon operations in an intuitive and streamlined way.

πŸ’‘ Powered by Python and focused on speed, clarity and results.


✨ Features

  • πŸ” Interactive hacker-style CLI shell
  • πŸ”— Passive and active recon modules
  • 🧩 Modular architecture with shared utilities
  • πŸ“ Output saving in TXT, JSON, CSV
  • πŸš€ Multithreaded path probing with live feedback
  • 🧾 Certificate transparency & subdomain discovery
  • 🌐 Wayback, URLScan and CommonCrawl support
  • 🧠 Built-in wordlist fallback & auto-detection
  • πŸ”§ pipx-installable for global CLI use
  • βœ… --help, --version and update command support

πŸš€ Installation (Recommended: pipx)

Use pipx for a clean, isolated global installation:

# Install pipx (if not already)
sudo apt install pipx
pipx ensurepath
source ~/.bashrc  # or ~/.zshrc

# Clone and install GhostPath
git clone https://github.com/atharvbyadav/GhostPath.git
cd GhostPath
pipx install .

βœ… Run from anywhere:

GhostPath

GhostPath Terminal Banner


🐍 Running without pipx (Direct Script Mode)

If you prefer not to use pipx, you can run GhostPath directly using Python:

1. Clone the repository

git clone https://github.com/atharvbyadav/GhostPath.git
cd GhostPath

2. (Optional) Create a virtual environment

Highly recommended to isolate dependencies.

python3 -m venv venv
source venv/bin/activate

3. Install the dependencies

pip install -r requirements.txt

4. Run the GhostPath CLI shell

python3 main_cli.py

πŸ’» Usage Overview

Once inside the shell:

ghostpath> help

You’ll see:

🧩 Available GhostPath Commands:
  timetrail      β†’ Fetch historical URLs from archives (Wayback, URLScan, Common Crawl)
  domainscope    β†’ Discover subdomains & DNS profiling
  pathprobe      β†’ Actively probe directories and endpoints
  certtrack      β†’ Get subdomains from public SSL/TLS certs
  version        β†’ Show current installed version
  clear          β†’ Clear the screen
  help           β†’ Show this help menu
  exit           β†’ Exit GhostPath CLI

🧩 Modules

πŸ•°οΈ timetrail

Fetch historical URLs from:

  • Common Crawl (default)
  • Wayback Machine
  • URLScan.io
timetrail --target example.com
timetrail --target example.com --source wayback --output urls.json --format json

🌐 domainscope

Find subdomains and related DNS data.

domainscope --target example.com
domainscope --target example.com --output domains.txt

πŸ“œ certtrack

Gather subdomains from SSL/TLS certificate transparency logs.

certtrack --target example.com
certtrack --target example.com --output certs.csv --format csv

πŸ”“ pathprobe

Actively probe common paths/endpoints on a web app using HTTP requests.

pathprobe --target https://example.com
pathprobe --target https://example.com --wordlist lists/path-wordlist.txt --output result.json --format json

If no wordlist is passed, it will fallback to: GhostPath/lists/path-wordlist.txt


πŸ§ͺ Output Formats

All modules support output saving in:

  • βœ… .txt
  • βœ… .json
  • βœ… .csv

Just pass:

--output filename --format txt|json|csv

πŸ“¦ Version & Self-Update

Check current version:

ghostpath> version

Reinstall / Update (via pipx):

pipx reinstall GhostPath

πŸ“œ License

BSD 3-Clause License

Copyright (c) 2025, Atharv Yadav
All rights reserved.

πŸ“„ See the LICENSE file for full license terms.


🀝 Contributing

We welcome your pull requests, feature ideas and improvements to make GhostPath even better! Here's how to contribute:

  1. Fork the repository

  2. Clone your fork locally:

    git clone https://github.com/yourusername/GhostPath.git
    cd GhostPath
  3. Create a new branch for your changes:

    git checkout -b feature/your-feature
  4. Make your changes and commit:

    git commit -m "Add: your feature/fix summary"
    git push origin feature/your-feature
  5. Open a Pull Request on GitHub πŸ“¬

Please follow best practices and write clear commit messages πŸ™Œ


πŸ‘¨β€πŸ’» Author

β”Œβ”€[ Coded with β˜• + ⚑ by Atharv Yadav ]
β”‚
β”œβ”€πŸ› οΈ  Creator of GhostPath
β”œβ”€πŸŒ  https://github.com/atharvbyadav
β””β”€πŸ“§  uuwr5t1s [at] duck [dot] com
      { _Looks suspicious? Good. It’s mine. The ducks work for me. πŸ¦†πŸ’»_ }

"I don’t just scan β€” I haunt networks." πŸ‘»

πŸ”— GitHub: @atharvbyadav
βœ‰οΈ Email Me


πŸ•·οΈ GhostPath β€” Stealthy. Modular. Effective.


About

πŸ‘» GhostPath β€” A powerful modular reconnaissance toolkit built for hackers, OSINT professionals & bug bounty hunters β€” passive + active recon in a sleek CLI shell. Discover subdomains, probe paths, mine archives and hunt certificates β€” all from one interactive terminal interface.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages