<h2 align="center">
<img src="https://raw.githubusercontent.com/atharvbyadav/GhostPath/gh-pages/GhostPath-New.png" alt="GhostPath Logo" width="700"/>
</h2>
<H3>
<p align="center">
<i><b>GhostPath</b> β A Modern Interactive Reconnaissance Toolkit for Hackers & Security Researchers π΅οΈββοΈ</i>
</p>
</H3>
<p align="center">
<img src="https://img.shields.io/badge/license-BSD%203--Clause-blue.svg" alt="License">
<img src="https://img.shields.io/badge/python-3.8%2B-blue" alt="Python">
<img src="https://img.shields.io/badge/type-Passive%20%2F%20Active%20Recon-yellow" alt="Recon Type">
<img src="https://img.shields.io/badge/modules-TimeTrail%20|%20CertTrack%20|%20PathProbe%20|%20DomainScope-orange" alt="Modules">
<img src="https://img.shields.io/badge/focus-OSINT%20Recon-red" alt="Focus">
<img src="https://img.shields.io/badge/debug-Verbose%20Logs%20Available-lightgrey" alt="Debug">
<img src="https://img.shields.io/badge/platform-Linux%20|%20WSL%20|%20MacOS-lightgreen" alt="Platform">
<img src="https://img.shields.io/badge/status-Under%20Active%20Development-brightgreen" alt="Status">
</p>
---
## π§ What is GhostPath?
**GhostPath** is a professional-grade CLI reconnaissance toolkit designed for cybersecurity researchers, penetration testers and bug bounty hunters. It provides a modular, extensible and interactive shell to run recon operations in an intuitive and streamlined way.
π‘ Powered by Python and focused on speed, clarity and results.
---
## β¨ Features
- π Interactive hacker-style CLI shell
- π Passive and active recon modules
- π§© Modular architecture with shared utilities
- π Output saving in TXT, JSON, CSV
- π Multithreaded path probing with live feedback
- π§Ύ Certificate transparency & subdomain discovery
- π Wayback, URLScan and CommonCrawl support
- π§ Built-in wordlist fallback & auto-detection
- π§ `pip` - installable for users
- π§ `pipx`-installable for global CLI use
- β
`--help`, `--version` and `update` command support
---
## π Installation (Recommended: pipx)
Use **pipx** for a clean, isolated global installation:
```bash
# Install pipx (if not already)
sudo apt install pipx
pipx ensurepath
source ~/.bashrc # or ~/.zshrc
# Install GhostPath
pipx install GhostPath
````
### β
Run from anywhere:
```bash
GhostPath
```
Use **pip** for easy and quick installation:
```bash
# install GhostPath
pip install GhostPath
```
If your OS does not support direct pip installation, use a virtual environment for installation
```bash
python3 -m venv venv
source venv/bin/activate
```
> Note that if you use a virtual environment you can only use the tool inside that environment. For global use try **pipx**.
---
<img src="https://raw.githubusercontent.com/atharvbyadav/GhostPath/gh-pages/GhostPath-TerminalLogo.png" alt="GhostPath Terminal Banner" width="100%"/>
---
## π Running without pipx (Direct Script Mode)
If you prefer not to use pipx or pip, you can run GhostPath directly using Python:
### 1. Clone the repository
```bash
git clone https://github.com/atharvbyadav/GhostPath.git
cd GhostPath
```
### 2. (Optional) Create a virtual environment
> Highly recommended to isolate dependencies.
```bash
python3 -m venv venv
source venv/bin/activate
```
### 3. Install the dependencies
```bash
pip install -r requirements.txt
```
### 4. Run the GhostPath CLI shell
```bash
python3 main_cli.py
```
---
## π» Usage Overview
Once inside the shell:
```bash
ghostpath> help
```
Youβll see:
```
π§© Available GhostPath Commands:
timetrail β Fetch historical URLs from archives (Wayback, URLScan, Common Crawl)
domainscope β Discover subdomains & DNS profiling
pathprobe β Actively probe directories and endpoints
certtrack β Get subdomains from public SSL/TLS certs
version β Show current installed version
clear β Clear the screen
help β Show this help menu
exit β Exit GhostPath CLI
```
---
## π§© Modules
### π°οΈ `timetrail`
Fetch historical URLs from:
* Common Crawl *(default)*
* Wayback Machine
* URLScan.io
```bash
timetrail --target example.com
timetrail --target example.com --source wayback --output urls.json --format json
```
---
### π `domainscope`
Find subdomains and related DNS data.
```bash
domainscope --target example.com
domainscope --target example.com --output domains.txt
```
---
### π `certtrack`
Gather subdomains from SSL/TLS certificate transparency logs.
```bash
certtrack --target example.com
certtrack --target example.com --output certs.csv --format csv
```
---
### π `pathprobe`
Actively probe common paths/endpoints on a web app using HTTP requests.
```bash
pathprobe --target https://example.com
pathprobe --target https://example.com --wordlist lists/path-wordlist.txt --output result.json --format json
```
> If no wordlist is passed, it will fallback to:
> `GhostPath/lists/path-wordlist.txt`
---
## π§ͺ Output Formats
All modules support output saving in:
* β
`.txt`
* β
`.json`
* β
`.csv`
Just pass:
```bash
--output filename --format txt|json|csv
```
---
## π¦ Version & Self-Update
### Check current version:
```bash
ghostpath> version
```
---
### Reinstall / Update (via pipx):
```bash
pipx reinstall GhostPath
```
---
## π License
```text
BSD 3-Clause License
Copyright (c) 2025, Atharv Yadav
All rights reserved.
```
> π See the [LICENSE](LICENSE) file for full license terms.
---
## π€ Contributing
We welcome your pull requests, feature ideas and improvements to make **GhostPath** even better! Here's how to contribute:
1. **Fork** the repository
2. **Clone** your fork locally:
```bash
git clone https://github.com/yourusername/GhostPath.git
cd GhostPath
```
3. **Create a new branch** for your changes:
```bash
git checkout -b feature/your-feature
```
4. Make your changes and **commit**:
```bash
git commit -m "Add: your feature/fix summary"
git push origin feature/your-feature
```
5. Open a **Pull Request** on GitHub π¬
> Please follow best practices and write clear commit messages π
---
## π¨βπ» Author
```bash
ββ[ Coded with β + β‘ by Atharv Yadav ]
β
ββπ οΈ Creator of GhostPath
ββπ https://github.com/atharvbyadav
ββπ§ uuwr5t1s [at] duck [dot] com
{ _Looks suspicious? Good. Itβs mine. The ducks work for me. π¦π»_ }
```
> *"I donβt just scan β I haunt networks."* π»
<p>
π <a href="https://github.com/atharvbyadav" target="_blank">GitHub: @atharvbyadav</a> <br>
βοΈ <a href="mailto:uuwr5t1s@duck.com">Email Me</a>
</p>
---
<p align="center"><i>π·οΈ GhostPath β Stealthy. Modular. Effective.</i></p>
---
Raw data
{
"_id": null,
"home_page": "https://github.com/atharvbyadav/GhostPath",
"name": "GhostPath",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.7",
"maintainer_email": null,
"keywords": "osint, recon, security, hacking, penetration-testing, cli",
"author": "Atharv Yadav",
"author_email": null,
"download_url": "https://files.pythonhosted.org/packages/40/bf/87f2fefe39d6df4f22ea5ad215b943fb5280282a53da4c4597076965e650/ghostpath-2.3.7.tar.gz",
"platform": null,
"description": "<h2 align=\"center\">\n <img src=\"https://raw.githubusercontent.com/atharvbyadav/GhostPath/gh-pages/GhostPath-New.png\" alt=\"GhostPath Logo\" width=\"700\"/>\n</h2>\n\n<H3>\n<p align=\"center\">\n <i><b>GhostPath</b> \u2014 A Modern Interactive Reconnaissance Toolkit for Hackers & Security Researchers \ud83d\udd75\ufe0f\u200d\u2642\ufe0f</i>\n</p>\n</H3>\n\n<p align=\"center\">\n <img src=\"https://img.shields.io/badge/license-BSD%203--Clause-blue.svg\" alt=\"License\">\n <img src=\"https://img.shields.io/badge/python-3.8%2B-blue\" alt=\"Python\">\n <img src=\"https://img.shields.io/badge/type-Passive%20%2F%20Active%20Recon-yellow\" alt=\"Recon Type\">\n <img src=\"https://img.shields.io/badge/modules-TimeTrail%20|%20CertTrack%20|%20PathProbe%20|%20DomainScope-orange\" alt=\"Modules\">\n <img src=\"https://img.shields.io/badge/focus-OSINT%20Recon-red\" alt=\"Focus\">\n <img src=\"https://img.shields.io/badge/debug-Verbose%20Logs%20Available-lightgrey\" alt=\"Debug\">\n <img src=\"https://img.shields.io/badge/platform-Linux%20|%20WSL%20|%20MacOS-lightgreen\" alt=\"Platform\">\n <img src=\"https://img.shields.io/badge/status-Under%20Active%20Development-brightgreen\" alt=\"Status\">\n</p>\n\n---\n\n## \ud83e\udde0 What is GhostPath?\n\n**GhostPath** is a professional-grade CLI reconnaissance toolkit designed for cybersecurity researchers, penetration testers and bug bounty hunters. It provides a modular, extensible and interactive shell to run recon operations in an intuitive and streamlined way.\n\n\ud83d\udca1 Powered by Python and focused on speed, clarity and results.\n\n---\n\n## \u2728 Features\n\n- \ud83d\udd0d Interactive hacker-style CLI shell\n- \ud83d\udd17 Passive and active recon modules\n- \ud83e\udde9 Modular architecture with shared utilities\n- \ud83d\udcc1 Output saving in TXT, JSON, CSV\n- \ud83d\ude80 Multithreaded path probing with live feedback\n- \ud83e\uddfe Certificate transparency & subdomain discovery\n- \ud83c\udf10 Wayback, URLScan and CommonCrawl support\n- \ud83e\udde0 Built-in wordlist fallback & auto-detection\n- \ud83d\udd27 `pip` - installable for users\n- \ud83d\udd27 `pipx`-installable for global CLI use\n- \u2705 `--help`, `--version` and `update` command support\n\n---\n\n## \ud83d\ude80 Installation (Recommended: pipx)\n\nUse **pipx** for a clean, isolated global installation:\n\n```bash\n# Install pipx (if not already)\nsudo apt install pipx\npipx ensurepath\nsource ~/.bashrc # or ~/.zshrc\n\n# Install GhostPath\npipx install GhostPath\n````\n\n### \u2705 Run from anywhere:\n\n```bash\nGhostPath\n```\n\nUse **pip** for easy and quick installation:\n\n```bash\n# install GhostPath\npip install GhostPath\n```\n\nIf your OS does not support direct pip installation, use a virtual environment for installation\n\n```bash\npython3 -m venv venv\nsource venv/bin/activate\n```\n> Note that if you use a virtual environment you can only use the tool inside that environment. For global use try **pipx**.\n\n---\n\n<img src=\"https://raw.githubusercontent.com/atharvbyadav/GhostPath/gh-pages/GhostPath-TerminalLogo.png\" alt=\"GhostPath Terminal Banner\" width=\"100%\"/>\n\n---\n\n## \ud83d\udc0d Running without pipx (Direct Script Mode)\n\nIf you prefer not to use pipx or pip, you can run GhostPath directly using Python:\n\n### 1. Clone the repository\n\n```bash\ngit clone https://github.com/atharvbyadav/GhostPath.git\ncd GhostPath\n```\n\n### 2. (Optional) Create a virtual environment\n\n> Highly recommended to isolate dependencies.\n\n```bash\npython3 -m venv venv\nsource venv/bin/activate\n```\n\n### 3. Install the dependencies\n\n```bash\npip install -r requirements.txt\n```\n\n### 4. Run the GhostPath CLI shell\n\n```bash\npython3 main_cli.py\n```\n\n---\n\n## \ud83d\udcbb Usage Overview\n\nOnce inside the shell:\n\n```bash\nghostpath> help\n```\n\nYou\u2019ll see:\n\n```\n\ud83e\udde9 Available GhostPath Commands:\n timetrail \u2192 Fetch historical URLs from archives (Wayback, URLScan, Common Crawl)\n domainscope \u2192 Discover subdomains & DNS profiling\n pathprobe \u2192 Actively probe directories and endpoints\n certtrack \u2192 Get subdomains from public SSL/TLS certs\n version \u2192 Show current installed version\n clear \u2192 Clear the screen\n help \u2192 Show this help menu\n exit \u2192 Exit GhostPath CLI\n```\n\n---\n\n## \ud83e\udde9 Modules\n\n### \ud83d\udd70\ufe0f `timetrail`\n\nFetch historical URLs from:\n\n* Common Crawl *(default)*\n* Wayback Machine\n* URLScan.io\n\n```bash\ntimetrail --target example.com\ntimetrail --target example.com --source wayback --output urls.json --format json\n```\n\n---\n\n### \ud83c\udf10 `domainscope`\n\nFind subdomains and related DNS data.\n\n```bash\ndomainscope --target example.com\ndomainscope --target example.com --output domains.txt\n```\n\n---\n\n### \ud83d\udcdc `certtrack`\n\nGather subdomains from SSL/TLS certificate transparency logs.\n\n```bash\ncerttrack --target example.com\ncerttrack --target example.com --output certs.csv --format csv\n```\n\n---\n\n### \ud83d\udd13 `pathprobe`\n\nActively probe common paths/endpoints on a web app using HTTP requests.\n\n```bash\npathprobe --target https://example.com\npathprobe --target https://example.com --wordlist lists/path-wordlist.txt --output result.json --format json\n```\n\n> If no wordlist is passed, it will fallback to:\n> `GhostPath/lists/path-wordlist.txt`\n\n---\n\n## \ud83e\uddea Output Formats\n\nAll modules support output saving in:\n\n* \u2705 `.txt`\n* \u2705 `.json`\n* \u2705 `.csv`\n\nJust pass:\n\n```bash\n--output filename --format txt|json|csv\n```\n\n---\n\n## \ud83d\udce6 Version & Self-Update\n\n### Check current version:\n\n```bash\nghostpath> version\n```\n\n---\n\n### Reinstall / Update (via pipx):\n\n```bash\npipx reinstall GhostPath\n```\n\n---\n\n## \ud83d\udcdc License\n\n```text\nBSD 3-Clause License\n\nCopyright (c) 2025, Atharv Yadav\nAll rights reserved.\n```\n\n> \ud83d\udcc4 See the [LICENSE](LICENSE) file for full license terms.\n\n---\n\n## \ud83e\udd1d Contributing\n\nWe welcome your pull requests, feature ideas and improvements to make **GhostPath** even better! Here's how to contribute:\n\n1. **Fork** the repository\n2. **Clone** your fork locally:\n\n ```bash\n git clone https://github.com/yourusername/GhostPath.git\n cd GhostPath\n ```\n3. **Create a new branch** for your changes:\n\n ```bash\n git checkout -b feature/your-feature\n ```\n4. Make your changes and **commit**:\n\n ```bash\n git commit -m \"Add: your feature/fix summary\"\n git push origin feature/your-feature\n ```\n5. Open a **Pull Request** on GitHub \ud83d\udcec\n\n> Please follow best practices and write clear commit messages \ud83d\ude4c\n\n---\n\n## \ud83d\udc68\u200d\ud83d\udcbb Author\n\n```bash\n\u250c\u2500[ Coded with \u2615 + \u26a1 by Atharv Yadav ]\n\u2502\n\u251c\u2500\ud83d\udee0\ufe0f Creator of GhostPath\n\u251c\u2500\ud83c\udf10 https://github.com/atharvbyadav\n\u2514\u2500\ud83d\udce7 uuwr5t1s [at] duck [dot] com\n { _Looks suspicious? Good. It\u2019s mine. The ducks work for me. \ud83e\udd86\ud83d\udcbb_ }\n```\n\n> *\"I don\u2019t just scan \u2014 I haunt networks.\"* \ud83d\udc7b\n\n<p>\n \ud83d\udd17 <a href=\"https://github.com/atharvbyadav\" target=\"_blank\">GitHub: @atharvbyadav</a> <br>\n \u2709\ufe0f <a href=\"mailto:uuwr5t1s@duck.com\">Email Me</a>\n</p>\n\n---\n\n<p align=\"center\"><i>\ud83d\udd77\ufe0f GhostPath \u2014 Stealthy. Modular. Effective.</i></p>\n\n---\n",
"bugtrack_url": null,
"license": "BSD-3-Clause",
"summary": "GhostPath - Interactive Recon Shell for Ethical Hackers",
"version": "2.3.7",
"project_urls": {
"Documentation": "https://github.com/atharvbyadav/GhostPath",
"Homepage": "https://github.com/atharvbyadav/GhostPath",
"Source": "https://github.com/atharvbyadav/GhostPath",
"Tracker": "https://github.com/atharvbyadav/GhostPath/issues"
},
"split_keywords": [
"osint",
" recon",
" security",
" hacking",
" penetration-testing",
" cli"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "5cfcaaa48a045c7da307820efd669b6f535e6bfaa31cc9187f366ba430449c2c",
"md5": "0c428812a78ccb3a54f9073528b50956",
"sha256": "48c1d61b5b39458c3b94d5b58437dd5bfa435b1aa02f48a5778de1a05fceb476"
},
"downloads": -1,
"filename": "ghostpath-2.3.7-py3-none-any.whl",
"has_sig": false,
"md5_digest": "0c428812a78ccb3a54f9073528b50956",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7",
"size": 88080,
"upload_time": "2025-08-01T07:34:35",
"upload_time_iso_8601": "2025-08-01T07:34:35.468748Z",
"url": "https://files.pythonhosted.org/packages/5c/fc/aaa48a045c7da307820efd669b6f535e6bfaa31cc9187f366ba430449c2c/ghostpath-2.3.7-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "40bf87f2fefe39d6df4f22ea5ad215b943fb5280282a53da4c4597076965e650",
"md5": "7a482b9e52932865054dc679ed52b574",
"sha256": "36c42ddb31566eacc21af3ef186229ba9ed86a1b3150af47356d7d1ae993af56"
},
"downloads": -1,
"filename": "ghostpath-2.3.7.tar.gz",
"has_sig": false,
"md5_digest": "7a482b9e52932865054dc679ed52b574",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7",
"size": 85433,
"upload_time": "2025-08-01T07:34:37",
"upload_time_iso_8601": "2025-08-01T07:34:37.435736Z",
"url": "https://files.pythonhosted.org/packages/40/bf/87f2fefe39d6df4f22ea5ad215b943fb5280282a53da4c4597076965e650/ghostpath-2.3.7.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-08-01 07:34:37",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "atharvbyadav",
"github_project": "GhostPath",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [
{
"name": "requests",
"specs": [
[
">=",
"2.31.0"
]
]
},
{
"name": "colorama",
"specs": [
[
">=",
"0.4.6"
]
]
}
],
"lcname": "ghostpath"
}