Ghost_Eye in Termux – Installation & Usage Commands

Ghost_Eye is a simple information gathering and footprinting tool that can be used inside the Termux terminal application on Android. It provides different reconnaissance and scanning options like Whois lookup, DNS lookup, port scanning, link grabbing, robots.txt scanning, IP information gathering, and other website footprinting tasks directly from a mobile device. Here’s what you can do with Ghost_Eye in Termux:

  • Perform Whois and DNS lookups.
  • Scan ports using Nmap.
  • Detect website technologies and CMS.
  • Collect website links and headers.
  • Perform basic footprinting and reconnaissance tasks.

Installation Commands

Update Termux packages:

pkg update && pkg upgrade -y

Install required packages:

pkg install git python ndk-sysroot clang make libffi openssl dnsutils whois nmap -y

Clone Ghost_Eye repository:

git clone https://github.com/BullsEye0/ghost_eye

Go to Ghost_Eye directory:

cd ghost_eye

Create the missing directories:

mkdir -p /data/data/com.termux/files/home/.local/share/

Install important webtech package:

pip install --upgrade webtech

Install Python requirements:

pip install -r requirements.txt

Start Ghost_Eye:

python ghost_eye.py

Usage Commands

Open Ghost_Eye directory:

cd ghost_eye

Run the tool:

python ghost_eye.py

After starting the tool, you will see menu options like these:

1. EtherApe – Graphical Network Monitor
2. DNS Lookup
3. Whois Lookup
4. Nmap Port Scan
5. HTTP Header Grabber
6. Clickjacking Test
7. Robots.txt Scanner
8. Cloudflare Cookie Scraper
9. Link Grabber
10. IP Location Finder
11. Detect CMS
12. Traceroute
13. Crawler Target URL + Robots.txt
14. Certificate Transparency Logs
15. Exit
  • EtherApe : Monitor and visualize network traffic.
  • DNS Lookup : Collect DNS records of a domain.
  • Whois Lookup : Get domain registration information.
  • Nmap Port Scan : Scan open ports on a target.
  • HTTP Header Grabber : View website HTTP headers.
  • Clickjacking Test : Check clickjacking protection status.
  • Robots.txt Scanner : Find hidden website paths.
  • Cloudflare Cookie Scraper : Collect Cloudflare-related cookies.
  • Link Grabber : Extract links from websites.
  • IP Location Finder : Get basic IP geolocation details.
  • Detect CMS : Identify website CMS technology.
  • Traceroute : Track network path to a target.
  • Crawler Target URL + Robots.txt : Crawl website URLs and robots.txt data.
  • Certificate Transparency Logs : Check SSL certificate log information.
  • Exit : Close the tool.

Choose the option you want and the tool will automatically perform the selected reconnaissance or information gathering task inside Termux.

READ ALSO  SlashX OSINT Tool – Installation & Commands in Termux

Leave a Comment