ghostpeek


Nameghostpeek JSON
Version 1.1.0 PyPI version JSON
download
home_pageNone
SummaryA stealthy domain reconnaissance tool for subdomain discovery and intelligence gathering
upload_time2025-08-30 20:30:17
maintainerNone
docs_urlNone
authorNone
requires_python>=3.6
licenseMIT
keywords reconnaissance subdomain security pentesting domain-analysis whois dns osint cybersecurity web-scraping
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # đŸ‘ģ GhostPeek

![GhostPeek Banner](https://img.shields.io/badge/GhostPeek-Domain%20Reconnaissance-blue?style=for-the-badge)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
[![Python](https://img.shields.io/badge/python-v3.6+-blue.svg)](https://www.python.org/downloads/)

**GhostPeek is a stealthy domain reconnaissance tool that silently collects intelligence on web domains.** Like a ghost, it reveals hidden digital footprints without drawing attention.

## What is GhostPeek and it's Features?

GhostPeek is a Python tool I made to learn more about web domains. Give it a domain name, and it will quietly gather all sorts of interesting information:

- 🔍 **Subdomain Discovery** - Finds subdomains you didn't know existed
- â„šī¸ **WHOIS Intelligence** - Shows domain ownership and registration details  
- 🌐 **DNS Mapping** - Maps out all DNS records (A, NS, MX, CNAME, etc.)
- đŸ–Ĩī¸ **IP Resolution** - Discovers IP addresses and ASN information
- 🔧 **Technology Detection** - Identifies web technologies and frameworks
- 📸 **Visual Screenshots** - Captures website screenshots automatically
- 📊 **HTML Reports** - Generates comprehensive, browsable reports
- ⚡ **Multi-threading** - Fast concurrent scanning
- 🎨 **Rich Terminal UI** - Beautiful command-line interface

## Why I Made This

I created GhostPeek as a personal project to learn more about how websites are structured and to practice my Python skills. It combines a bunch of different tools into one simple command, saving you time when you want to check out a website's technical details. Make sure to retry again in few mins if it catches 0 subdomains. 

## 🚀 Quick Start

### Installation

```bash
pip install ghostpeek
```

### One-Line Installation

```bash
# User installation
curl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | bash

# System-wide installation (requires sudo)
curl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | sudo bash

# After installation, simply run:
ghostpeek -d example.com
```

### Manual Installation

```bash
# Clone the repo
git clone https://github.com/kaizoku73/Ghostpeek.git
cd ghostpeek

# Install requirements
pip install -r requirements.txt
```

### Requirements

- Python 3.6+
- requests
- dnspython
- python-whois
- rich
- selenium
- python-Wappalyzer
- setuptools

## Basic Usage

```bash
# Scan a domain
python ghostpeek.py -d example.com

# Interactive mode
python ghostpeek.py

# Custom output directory
python ghostpeek.py -d example.com -o /path/to/output

# Adjust threading
python ghostpeek.py -d example.com -t 20

# Disable threading for sequential processing
python ghostpeek.py -d example.com --no-threading
```

### Options

```
-d, --domain    Target domain to investigate
-o, --output    Custom output directory (optional)
-t, --threads   Number of threads to use (default: 10)
--no-threading  Disable threading for sequential processing
```

## Example Output

When you run GhostPeek, you'll see a beautiful ASCII banner followed by real-time scanning progress:


```
▄████ ██░ ██ ▒█████ ██████ ▄▄▄█████▓ ██▓███ ▓█████ ▓█████ ██ ▄█▀
██▒ ▀█▒▓██░ ██▒▒██▒ ██▒▒██ ▒ ▓ ██▒ ▓▒▓██░ ██▒▓█ ▀ ▓█ ▀ ██▄█▒
...

Give your desire domain: example.com
Your secrets will be stored in: recon_example.com_20250825_143022

✓ Revealing WHOIS secrets for example.com
✓ Hunting for subdomains of example.com
✓ Found 15 unique domains
✓ Unmasking domains and resolving IPs
✓ Decoding DNS secrets
✓ Identifying technology fingerprints
✓ Capturing visual evidence

Mission accomplished! 🎉
Your intelligence report awaits: recon_example.com_20250825_143022/report.html
```

## The HTML Report

After GhostPeek finishes, it will automatically open an HTML report in your browser with tabs for:

- **📊 Overview** - Summary of findings and key metrics
- **â„šī¸ WHOIS Details** - Domain registration and ownership info
- **🔍 Subdomains** - Complete list of discovered subdomains
- **🌐 DNS Records** - Detailed DNS information for each domain
- **🔧 Technologies** - Identified web technologies and frameworks
- **📸 Screenshots** - Visual captures of all accessible websites

## Disclaimer

**This tool is designed for educational purposes and authorized security testing only.**

- Only scan domains you own or have explicit permission to test
- Respect robots.txt and website terms of service  
- Be mindful of rate limiting to avoid overwhelming target servers
- Use responsibly and ethically

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## 🔗 Connect

- **Author**: kaizoku73
- **GitHub**: [@kaizoku73](https://github.com/kaizoku73)

---

<div align="center">
Made with â¤ī¸ by kaizoku | ⭐ Star this repo if you found it helpful!
</div>

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "ghostpeek",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": null,
    "keywords": "reconnaissance, subdomain, security, pentesting, domain-analysis, whois, dns, osint, cybersecurity, web-scraping",
    "author": null,
    "author_email": "kaizoku73 <kaizoku73@proton.me>",
    "download_url": "https://files.pythonhosted.org/packages/0e/97/d5b4f8aed19a0667be65034b148ec0a76f597976ad59e850fa280ae78a97/ghostpeek-1.1.0.tar.gz",
    "platform": null,
    "description": "# \ud83d\udc7b GhostPeek\n\n![GhostPeek Banner](https://img.shields.io/badge/GhostPeek-Domain%20Reconnaissance-blue?style=for-the-badge)\n[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)\n[![Python](https://img.shields.io/badge/python-v3.6+-blue.svg)](https://www.python.org/downloads/)\n\n**GhostPeek is a stealthy domain reconnaissance tool that silently collects intelligence on web domains.** Like a ghost, it reveals hidden digital footprints without drawing attention.\n\n## What is GhostPeek and it's Features?\n\nGhostPeek is a Python tool I made to learn more about web domains. Give it a domain name, and it will quietly gather all sorts of interesting information:\n\n- \ud83d\udd0d **Subdomain Discovery** - Finds subdomains you didn't know existed\n- \u2139\ufe0f **WHOIS Intelligence** - Shows domain ownership and registration details  \n- \ud83c\udf10 **DNS Mapping** - Maps out all DNS records (A, NS, MX, CNAME, etc.)\n- \ud83d\udda5\ufe0f **IP Resolution** - Discovers IP addresses and ASN information\n- \ud83d\udd27 **Technology Detection** - Identifies web technologies and frameworks\n- \ud83d\udcf8 **Visual Screenshots** - Captures website screenshots automatically\n- \ud83d\udcca **HTML Reports** - Generates comprehensive, browsable reports\n- \u26a1 **Multi-threading** - Fast concurrent scanning\n- \ud83c\udfa8 **Rich Terminal UI** - Beautiful command-line interface\n\n## Why I Made This\n\nI created GhostPeek as a personal project to learn more about how websites are structured and to practice my Python skills. It combines a bunch of different tools into one simple command, saving you time when you want to check out a website's technical details. Make sure to retry again in few mins if it catches 0 subdomains. \n\n## \ud83d\ude80 Quick Start\n\n### Installation\n\n```bash\npip install ghostpeek\n```\n\n### One-Line Installation\n\n```bash\n# User installation\ncurl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | bash\n\n# System-wide installation (requires sudo)\ncurl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | sudo bash\n\n# After installation, simply run:\nghostpeek -d example.com\n```\n\n### Manual Installation\n\n```bash\n# Clone the repo\ngit clone https://github.com/kaizoku73/Ghostpeek.git\ncd ghostpeek\n\n# Install requirements\npip install -r requirements.txt\n```\n\n### Requirements\n\n- Python 3.6+\n- requests\n- dnspython\n- python-whois\n- rich\n- selenium\n- python-Wappalyzer\n- setuptools\n\n## Basic Usage\n\n```bash\n# Scan a domain\npython ghostpeek.py -d example.com\n\n# Interactive mode\npython ghostpeek.py\n\n# Custom output directory\npython ghostpeek.py -d example.com -o /path/to/output\n\n# Adjust threading\npython ghostpeek.py -d example.com -t 20\n\n# Disable threading for sequential processing\npython ghostpeek.py -d example.com --no-threading\n```\n\n### Options\n\n```\n-d, --domain    Target domain to investigate\n-o, --output    Custom output directory (optional)\n-t, --threads   Number of threads to use (default: 10)\n--no-threading  Disable threading for sequential processing\n```\n\n## Example Output\n\nWhen you run GhostPeek, you'll see a beautiful ASCII banner followed by real-time scanning progress:\n\n\n```\n\u2584\u2588\u2588\u2588\u2588 \u2588\u2588\u2591 \u2588\u2588 \u2592\u2588\u2588\u2588\u2588\u2588 \u2588\u2588\u2588\u2588\u2588\u2588 \u2584\u2584\u2584\u2588\u2588\u2588\u2588\u2588\u2593 \u2588\u2588\u2593\u2588\u2588\u2588 \u2593\u2588\u2588\u2588\u2588\u2588 \u2593\u2588\u2588\u2588\u2588\u2588 \u2588\u2588 \u2584\u2588\u2580\n\u2588\u2588\u2592 \u2580\u2588\u2592\u2593\u2588\u2588\u2591 \u2588\u2588\u2592\u2592\u2588\u2588\u2592 \u2588\u2588\u2592\u2592\u2588\u2588 \u2592 \u2593 \u2588\u2588\u2592 \u2593\u2592\u2593\u2588\u2588\u2591 \u2588\u2588\u2592\u2593\u2588 \u2580 \u2593\u2588 \u2580 \u2588\u2588\u2584\u2588\u2592\n...\n\nGive your desire domain: example.com\nYour secrets will be stored in: recon_example.com_20250825_143022\n\n\u2713 Revealing WHOIS secrets for example.com\n\u2713 Hunting for subdomains of example.com\n\u2713 Found 15 unique domains\n\u2713 Unmasking domains and resolving IPs\n\u2713 Decoding DNS secrets\n\u2713 Identifying technology fingerprints\n\u2713 Capturing visual evidence\n\nMission accomplished! \ud83c\udf89\nYour intelligence report awaits: recon_example.com_20250825_143022/report.html\n```\n\n## The HTML Report\n\nAfter GhostPeek finishes, it will automatically open an HTML report in your browser with tabs for:\n\n- **\ud83d\udcca Overview** - Summary of findings and key metrics\n- **\u2139\ufe0f WHOIS Details** - Domain registration and ownership info\n- **\ud83d\udd0d Subdomains** - Complete list of discovered subdomains\n- **\ud83c\udf10 DNS Records** - Detailed DNS information for each domain\n- **\ud83d\udd27 Technologies** - Identified web technologies and frameworks\n- **\ud83d\udcf8 Screenshots** - Visual captures of all accessible websites\n\n## Disclaimer\n\n**This tool is designed for educational purposes and authorized security testing only.**\n\n- Only scan domains you own or have explicit permission to test\n- Respect robots.txt and website terms of service  \n- Be mindful of rate limiting to avoid overwhelming target servers\n- Use responsibly and ethically\n\n## License\n\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\n\n## \ud83d\udd17 Connect\n\n- **Author**: kaizoku73\n- **GitHub**: [@kaizoku73](https://github.com/kaizoku73)\n\n---\n\n<div align=\"center\">\nMade with \u2764\ufe0f by kaizoku | \u2b50 Star this repo if you found it helpful!\n</div>\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "A stealthy domain reconnaissance tool for subdomain discovery and intelligence gathering",
    "version": "1.1.0",
    "project_urls": {
        "Bug Tracker": "https://github.com/kaizoku73/Ghostpeek/issues",
        "Documentation": "https://github.com/kaizoku73/Ghostpeek#readme",
        "Homepage": "https://github.com/kaizoku73/Ghostpeek",
        "Repository": "https://github.com/kaizoku73/Ghostpeek.git"
    },
    "split_keywords": [
        "reconnaissance",
        " subdomain",
        " security",
        " pentesting",
        " domain-analysis",
        " whois",
        " dns",
        " osint",
        " cybersecurity",
        " web-scraping"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "a393819db9c7d535c4f77b4aaf1323fb581ae06a1ab61994c7bdcc41d5bf371f",
                "md5": "bb0a5eb51a23828ad7637710046fcb54",
                "sha256": "9c5f265d77973d982f526bee77faf7fa24b63d42a543dae1fb865efa2d582422"
            },
            "downloads": -1,
            "filename": "ghostpeek-1.1.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "bb0a5eb51a23828ad7637710046fcb54",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 14114,
            "upload_time": "2025-08-30T20:30:15",
            "upload_time_iso_8601": "2025-08-30T20:30:15.743608Z",
            "url": "https://files.pythonhosted.org/packages/a3/93/819db9c7d535c4f77b4aaf1323fb581ae06a1ab61994c7bdcc41d5bf371f/ghostpeek-1.1.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "0e97d5b4f8aed19a0667be65034b148ec0a76f597976ad59e850fa280ae78a97",
                "md5": "99e86e064871ba4902c9fd8a4cd81f5f",
                "sha256": "5e2b1b5350e3e77b6ed80524cfd40d5b7fb1996d90b2604ba2bfdc805aebed48"
            },
            "downloads": -1,
            "filename": "ghostpeek-1.1.0.tar.gz",
            "has_sig": false,
            "md5_digest": "99e86e064871ba4902c9fd8a4cd81f5f",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 18334,
            "upload_time": "2025-08-30T20:30:17",
            "upload_time_iso_8601": "2025-08-30T20:30:17.891529Z",
            "url": "https://files.pythonhosted.org/packages/0e/97/d5b4f8aed19a0667be65034b148ec0a76f597976ad59e850fa280ae78a97/ghostpeek-1.1.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-08-30 20:30:17",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "kaizoku73",
    "github_project": "Ghostpeek",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [],
    "lcname": "ghostpeek"
}
        
Elapsed time: 1.63488s