Metadata-Version: 2.4
Name: ghostpeek
Version: 1.0.1
Summary: A stealthy domain reconnaissance tool for subdomain discovery and intelligence gathering
Author-email: kaizoku73 <ultimate0134@gmail.com>
License: MIT
Project-URL: Homepage, https://github.com/kaizoku73/Ghostpeek
Project-URL: Documentation, https://github.com/kaizoku73/Ghostpeek#readme
Project-URL: Repository, https://github.com/kaizoku73/Ghostpeek.git
Project-URL: Bug Tracker, https://github.com/kaizoku73/Ghostpeek/issues
Keywords: reconnaissance,subdomain,security,pentesting,domain-analysis,whois,dns,osint,cybersecurity,web-scraping
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: System Administrators
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Topic :: Security
Classifier: Topic :: Internet :: WWW/HTTP
Classifier: Topic :: System :: Networking :: Monitoring
Classifier: Topic :: System :: Systems Administration
Classifier: Environment :: Console
Requires-Python: >=3.6
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: aiohappyeyeballs==2.6.1
Requires-Dist: aiohttp==3.11.16
Requires-Dist: aioresponses==0.7.8
Requires-Dist: aiosignal==1.3.2
Requires-Dist: attrs==25.3.0
Requires-Dist: beautifulsoup4==4.13.3
Requires-Dist: certifi==2025.1.31
Requires-Dist: cffi==1.17.1
Requires-Dist: charset-normalizer==3.4.1
Requires-Dist: dnspython==2.7.0
Requires-Dist: frozenlist==1.5.0
Requires-Dist: h11==0.14.0
Requires-Dist: httpretty==1.1.4
Requires-Dist: idna==3.10
Requires-Dist: lxml==5.3.1
Requires-Dist: markdown-it-py==3.0.0
Requires-Dist: mdurl==0.1.2
Requires-Dist: multidict==6.2.0
Requires-Dist: outcome==1.3.0.post0
Requires-Dist: packaging==24.2
Requires-Dist: propcache==0.3.1
Requires-Dist: pycparser==2.22
Requires-Dist: Pygments==2.19.1
Requires-Dist: PySocks==1.7.1
Requires-Dist: python-dateutil==2.9.0.post0
Requires-Dist: python-Wappalyzer==0.3.1
Requires-Dist: python-whois==0.9.5
Requires-Dist: requests==2.32.3
Requires-Dist: rich==14.0.0
Requires-Dist: selenium==4.31.0
Requires-Dist: setuptools==79.0.0
Requires-Dist: six==1.17.0
Requires-Dist: sniffio==1.3.1
Requires-Dist: sortedcontainers==2.4.0
Requires-Dist: soupsieve==2.6
Requires-Dist: trio==0.29.0
Requires-Dist: trio-websocket==0.12.2
Requires-Dist: typing_extensions==4.13.0
Requires-Dist: urllib3==2.3.0
Requires-Dist: websocket-client==1.8.0
Requires-Dist: wsproto==1.2.0
Requires-Dist: yarl==1.18.3
Provides-Extra: dev
Requires-Dist: pytest>=7.0; extra == "dev"
Requires-Dist: pytest-cov>=4.0; extra == "dev"
Requires-Dist: black>=22.0; extra == "dev"
Requires-Dist: flake8>=5.0; extra == "dev"
Requires-Dist: mypy>=1.0; extra == "dev"
Dynamic: license-file

# 👻 GhostPeek

![GhostPeek Banner](https://img.shields.io/badge/GhostPeek-Domain%20Reconnaissance-blue?style=for-the-badge)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
[![Python](https://img.shields.io/badge/python-v3.6+-blue.svg)](https://www.python.org/downloads/)
[![Downloads](https://pepy.tech/badge/ghostpeek)](https://pepy.tech/project/ghostpeek)

**GhostPeek is a stealthy domain reconnaissance tool that silently collects intelligence on web domains.** Like a ghost, it reveals hidden digital footprints without drawing attention.

## What is GhostPeek and it's Features?

GhostPeek is a Python tool I made to learn more about web domains. Give it a domain name, and it will quietly gather all sorts of interesting information:

- 🔍 **Subdomain Discovery** - Finds subdomains you didn't know existed
- ℹ️ **WHOIS Intelligence** - Shows domain ownership and registration details  
- 🌐 **DNS Mapping** - Maps out all DNS records (A, NS, MX, CNAME, etc.)
- 🖥️ **IP Resolution** - Discovers IP addresses and ASN information
- 🔧 **Technology Detection** - Identifies web technologies and frameworks
- 📸 **Visual Screenshots** - Captures website screenshots automatically
- 📊 **HTML Reports** - Generates comprehensive, browsable reports
- ⚡ **Multi-threading** - Fast concurrent scanning
- 🎨 **Rich Terminal UI** - Beautiful command-line interface

## Why I Made This

I created GhostPeek as a personal project to learn more about how websites are structured and to practice my Python skills. It combines a bunch of different tools into one simple command, saving you time when you want to check out a website's technical details. Make sure to retry again in few mins if it catches 0 subdomains. 

## 🚀 Quick Start

### Installation

```bash
pip install ghostpeek
```

### One-Line Installation

```bash
# User installation
curl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | bash

# System-wide installation (requires sudo)
curl -sSL https://raw.githubusercontent.com/kaizoku73/Ghostpeek/main/install.sh | sudo bash

# After installation, simply run:
ghostpeek -d example.com
```

### Manual Installation

```bash
# Clone the repo
git clone https://github.com/kaizoku73/Ghostpeek.git
cd ghostpeek

# Install requirements
pip install -r requirements.txt
```

### Requirements

- Python 3.6+
- requests
- dnspython
- python-whois
- rich
- selenium
- python-Wappalyzer
- setuptools

## Basic Usage

```bash
# Scan a domain
python ghostpeek.py -d example.com

# Interactive mode
python ghostpeek.py

# Custom output directory
python ghostpeek.py -d example.com -o /path/to/output

# Adjust threading
python ghostpeek.py -d example.com -t 20

# Disable threading for sequential processing
python ghostpeek.py -d example.com --no-threading
```

### Options

```
-d, --domain    Target domain to investigate
-o, --output    Custom output directory (optional)
-t, --threads   Number of threads to use (default: 10)
--no-threading  Disable threading for sequential processing
```

## Example Output

When you run GhostPeek, you'll see a beautiful ASCII banner followed by real-time scanning progress:


```
▄████ ██░ ██ ▒█████ ██████ ▄▄▄█████▓ ██▓███ ▓█████ ▓█████ ██ ▄█▀
██▒ ▀█▒▓██░ ██▒▒██▒ ██▒▒██ ▒ ▓ ██▒ ▓▒▓██░ ██▒▓█ ▀ ▓█ ▀ ██▄█▒
...

Give your desire domain: example.com
Your secrets will be stored in: recon_example.com_20250825_143022

✓ Revealing WHOIS secrets for example.com
✓ Hunting for subdomains of example.com
✓ Found 15 unique domains
✓ Unmasking domains and resolving IPs
✓ Decoding DNS secrets
✓ Identifying technology fingerprints
✓ Capturing visual evidence

Mission accomplished! 🎉
Your intelligence report awaits: recon_example.com_20250825_143022/report.html
```

## The HTML Report

After GhostPeek finishes, it will automatically open an HTML report in your browser with tabs for:

- **📊 Overview** - Summary of findings and key metrics
- **ℹ️ WHOIS Details** - Domain registration and ownership info
- **🔍 Subdomains** - Complete list of discovered subdomains
- **🌐 DNS Records** - Detailed DNS information for each domain
- **🔧 Technologies** - Identified web technologies and frameworks
- **📸 Screenshots** - Visual captures of all accessible websites

## Disclaimer

**This tool is designed for educational purposes and authorized security testing only.**

- Only scan domains you own or have explicit permission to test
- Respect robots.txt and website terms of service  
- Be mindful of rate limiting to avoid overwhelming target servers
- Use responsibly and ethically

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## 🔗 Connect

- **Author**: kaizoku73
- **GitHub**: [@kaizoku73](https://github.com/kaizoku73)

---

<div align="center">
Made with ❤️ by kaizoku
</div>
