Skip to content

GhostMap is a Bash-based wrapper for RustScan that identifies web ports, fingerprints proxy/backend technologies, and detects path smuggling risks.

Notifications You must be signed in to change notification settings

xploitnik/GhostMap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ‘» GhostMap - Smarter Recon with RustScan + Web Stack Fingerprinting

GhostMap is a Bash-driven reconnaissance tool that supercharges RustScan with automatic detection of web ports, backend technologies, and reverse proxy misconfigurations.

Whether you're doing CTFs, bug bounties, or internal red teaming, GhostMap helps you spot path smuggling vectors and backend leaks β€” fast.

This repo is intended for intial scan - as i have used the following flags -sS -Pn -n - must Fuzz for correct path for/if smugguling attack is possible.


🧠 Features

  • ⚑ RustScan wrapper: Auto-runs scans, saves .xml + .json outputs
  • 🌐 Web port detection: 80, 443, 8080, 8443, 5000, 9000, etc.
  • πŸ” Tech fingerprinting:
    • Frontend proxies: NGINX, Apache, IIS
    • Backends: Tomcat, Jetty, Flask, WebLogic, Spring Boot, WildFly
  • πŸ§ͺ Path smuggling probe: Sends /;foo=bar/ to test route parsing
  • πŸ’₯ Stack leak detection: Queries /doesnotexist for 404 info leaks
  • 🚨 Alerts on dangerous combos like:
    • NGINX β†’ Tomcat
    • Apache β†’ Tomcat
    • IIS β†’ WildFly

πŸ“¦ Requirements

  • RustScan
  • Tools: bash, curl, awk, grep, getent
  • Optional: jq (for JSON parsing if automating further)

πŸ› οΈ Usage

./ghostmap.sh <target-hostname>

About

GhostMap is a Bash-based wrapper for RustScan that identifies web ports, fingerprints proxy/backend technologies, and detects path smuggling risks.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages