GhostEyes is a powerful, beginner-friendly Python-based port scanner designed for ethical hacking, penetration testing, and network diagnostics. It supports fast threaded scans, banner grabbing, OS detection, and web tech fingerprinting.
π For educational and ethical use only.
- β Multithreaded TCP Port Scanning
- β Banner Grabbing (on open ports)
- β OS Detection (based on TTL fingerprinting)
- β
Web Technology Fingerprinting (
Server,X-Powered-By) - β Common Service Mapping
- β Fast with Thread Support
- β Output Saving to File
- β User-friendly CLI
git clone https://github.com/6lackRaven/GhostEyes.git
cd GhostEyes
pip install -r requirements.txt
---
## π Usage
python3 scan.py <target> [options]
## π§ Example
python3 scan.py scanme.nmap.org --start 1 --end 100 --threads 100 --mode banner --detect --output result.txt
---
## π οΈ Options
Option Description
<target> Target IP or domain
--start Start port (default: 1)
--end End port (default: 1024)
--threads Number of threads (default: 100)
--mode basic (default) or banner mode
--detect Enable OS & Web tech fingerprinting
--output Save results to a file
---
## π What It Detects
Open TCP ports (1β65535)
Banner info from services (if any)
Server and backend framework (via HTTP headers)
OS fingerprinting from TTL analysis (basic)
---
## π Output
If --output result.txt is specified, the open ports and services will be saved to a .txt file.
---
## π§ How It Works
Connects to each port via TCP (multi-threaded)
Grabs banners from open ports
Uses TTL to guess operating system (e.g. Linux vs Windows)
Sends HTTP requests to detect backend tech via headers
---
## β οΈ Disclaimer
This tool is built for learning and ethical testing only. Do not scan networks without permission.