GHOSTRACE is an advanced OSINT (Open Source Intelligence) tool that helps you discover username footprints, check email breaches, enumerate subdomains, and more - all from a sleek terminal or web interface.
GHOSTRACE v1.2 comes packed with 22 powerful OSINT scanning capabilities.
Find usernames across 181+ social platforms, forums, and websites simultaneously.
Check if emails have been compromised in data breaches using HaveIBeenPwned.
Get detailed domain registration information including registrar, dates, and nameservers.
Discover subdomains by checking common prefixes and variations.
Extract SSL certificate details including issuer, expiration, and subject info.
Lookup IP address location including city, country, ISP, and organization.
Scan common ports to identify running services on target systems.
Find hostname from IP address using reverse DNS lookup.
Extract emails, links, and content from websites for OSINT purposes.
Detect CMS, frameworks, and server technologies (WordPress, React, Nginx, etc).
Check for exposed AWS S3, Azure Blob, and GCP buckets.
Extract emails, phone numbers, files, and API endpoints from websites.
Find Autonomous System Number and network prefix information.
Analyze HTTP response headers for security and technology clues.
Check domain creation date and age for legitimacy verification.
Search Pastebin dumps for leaked credentials and data.
Search Tor network (.onion) via Ahmia for hidden content.
Check password hashes against known breach databases.
Get GHOSTRACE up and running in just a few steps.
# Clone GHOSTRACE
git clone https://github.com/chriz-3656/GHOSTRACE.git
cd GHOSTRACE
# Install required Python packages
pip install -r requirements.txt
# Terminal Interface
python scanner.py
# OR Web Interface
python web.py
Run python scanner.py to access the interactive menu-driven interface.
GHOSTRACE v1.2
[1] Username Scan [12] Reverse DNS
[2] Email + Breaches [13] Web Crawler
[3] WHOIS Lookup [14] ASN Lookup
[4] Subdomains [15] HTTP Headers
[5] SSL Check [16] Domain Age
[6] IP Geolocation [17] Content Discovery
[7] Phone Lookup [18] Pastebin Search
[8] DNS Lookup [19] Cloud Storage
[9] List Sites [20] Technology Detect
[10] Hash Lookup [21] Dark Web Search
[11] Port Scan [22] Settings
[0] Exit
Run python web.py to start the Flask web server.
# Start web server
python web.py
# Access in browser
http://localhost:5000
# Scan username
> Select 1
> Enter username: johndoe
# Check email breach
> Select 2
> Enter email: user@example.com
# Lookup domain
> Select 3
> Enter domain: example.com
GHOSTRACE works fully without any API keys!
| Feature | API | Cost |
|---|---|---|
| IP Geolocation | ip-api.com | Free (45/min) |
| Email Breaches | HaveIBeenPwned | Free (k-anonymity) |
| ASN Lookup | BGPView | Free |
| Dark Web Search | Ahmia | Free |
Get API keys for higher rate limits and detailed results:
Make sure all dependencies are installed:
pip install -r requirements.txt
If you get connection errors, check your internet connection and try again. Some sites may block requests or be temporarily unavailable.
If scanning too fast, increase the delay in settings. The default delay is 0.5 seconds between requests.
Some sites have expired or invalid SSL certificates. This is normal for older websites.
GHOSTRACE is an OSINT tool designed for legitimate security research and educational purposes only. Always obtain proper authorization before scanning systems you don't own. The developers assume no liability for misuse of this tool.