What is Ghost Scout?
Ghost Scout is an LLM-assisted OSINT and phishing email generation tool that performs reconnaissance on target companies, finds their employees, and builds profiles for personalized emails based on public sources.Key Features
Domain Discovery
Add target domains and find related ones through autodiscover techniques
Email Format Detection
Identify company email patterns and DNS records
Contact Discovery
Find potential contacts/employees using Hunter.io API
Source Scraping
Scrape discovered sources for enrichment information
Profile Generation
Generate detailed employee profiles using AI
Pretext Generation
Create personalized phishing messages with AI
Real-time Updates
Get live feedback as reconnaissance and processing happens
Source Conversion
Convert HTML sources to Markdown for better LLM queries
Technologies
Ghost Scout is built with modern web technologies and AI integration:- Backend
- Frontend
- External Services
Backend Stack:
- Framework: Node.js with Fastify
- Database: SQLite for data storage
- Job Processing: Bee-Queue with Redis for background tasks
- Real-time Updates: Socket.io for live feedback
Architecture
Application Structure
System Components
Database Schema
Ghost Scout uses SQLite with the following tables:Domain
Domain
Stores target company domains with DNS recordsPurpose: Track target organizations and their domain configurations
SourceDomain
SourceDomain
Tracks domains where source data is foundPurpose: Organize discovered information sources by domain
Target
Target
Stores information about target individuals (prospects)Purpose: Track discovered employees and their information
SourceData
SourceData
Contains information about URLs where target data was foundPurpose: Track the origin of scraped information for each target
TargetSourceMap
TargetSourceMap
Maps the many-to-many relationship between targets and sourcesPurpose: Associate multiple sources with each target and vice versa
Prompt
Prompt
Stores LLM prompts for pretext generationPurpose: Manage prompt templates for different phishing scenarios
Pretext
Pretext
Stores generated phishing messagesPurpose: Save and manage AI-generated phishing emails
Operational Workflow
Typical Red Team Campaign
1
Add Target Domain
Enter the target company’s domain into Ghost Scout to begin reconnaissance
2
Start Reconnaissance
Initiate automated discovery of employees and email formats through Hunter.io API
3
Scrape Sources
Ghost Scout scrapes discovered URLs to enrich contact information
4
Generate Profiles
AI generates detailed profiles for discovered contacts based on scraped data
5
Create Pretexts
AI creates personalized phishing emails tailored to each target’s profile
6
Review & Export
Review, approve, and export pretexts for use in phishing campaigns
Data Flow
Use Cases
Red Team Reconnaissance
Red Team Reconnaissance
Objective: Automate OSINT gathering for phishing campaigns
- Discover employee names and roles at target organizations
- Identify email formats and patterns
- Build comprehensive profiles from public sources
- Generate personalized pretexts at scale
- Reduce manual reconnaissance time
Spear Phishing Preparation
Spear Phishing Preparation
Objective: Create highly targeted phishing campaigns
- Research individual targets automatically
- Leverage AI to create convincing pretexts
- Personalize messages based on target profiles
- Increase campaign success rates
- Scale personalization across many targets
Social Engineering
Social Engineering
Job Queue System
Ghost Scout uses Redis-backed job queues for asynchronous processing:- DNS Queue
- Source Queue
- Profile Queue
- Pretext Queue
Purpose: Process DNS lookups and autodiscovery
- Queries DNS records for target domains
- Performs autodiscovery for related domains
- Stores DNS configuration data
Real-time Features
Live Progress
Socket.io provides real-time updates as reconnaissance and processing tasks execute
Job Status
Monitor queue processing status and job completion in real-time
Instant Feedback
See results as they’re discovered without page refreshes
Background Processing
Continue working while long-running tasks process in the background
AI Integration
Profile Generation
Ghost Scout uses Anthropic’s Claude to generate detailed target profiles:- Analyzes scraped source data
- Identifies key information about targets
- Creates structured profiles with relevant details
- Extracts professional information and interests
- Provides context for pretext generation
Pretext Generation
AI-powered phishing email creation:- Leverages target profiles for personalization
- Uses prompt templates from prompt_library/
- Generates convincing, contextual pretexts
- Adapts tone and content to target characteristics
- Creates multiple pretext variations
Requirements
Required Services:- Hunter.io
- Anthropic
- Redis
- MarkItDown-API
Purpose: Contact discovery and email format detection
- API key required for contact searches
- Used to find employees at target companies
- Identifies company email patterns
Detection Considerations
Detection Indicators
API Activity:- Hunter.io API queries for target domain
- Patterns of email address enumeration
- Bulk contact lookups
- Rapid sequential API requests
- Web scraping of public profiles
- Systematic URL enumeration
- Connections to MarkItDown-API service
- High volume of HTTP requests to target-related sites
- Hunter.io may notify organizations when their domain is searched
- Target companies may receive alerts about email searches
- API usage patterns may trigger rate limiting
OPSEC Considerations
API Usage
API Usage
- Use dedicated Hunter.io accounts for operations
- Be aware that searches may alert target organizations
- Consider rate limiting to avoid detection
- Rotate API keys if performing multiple campaigns
Web Scraping
Web Scraping
- Respect robots.txt and rate limits
- Use appropriate user agents
- Space out requests to avoid detection
- Consider using proxies for source scraping
Data Storage
Data Storage
- SQLite database contains all reconnaissance data
- Secure database files appropriately
- Consider encryption for sensitive campaign data
- Regularly clean up old campaign data
Infrastructure
Infrastructure
- Redis contains job queue data
- Secure Redis instance appropriately
- Consider isolated infrastructure for campaigns
- Use separate instances per client/campaign
Defensive Recommendations
Detection Strategies
Detection Strategies
For Blue Teams:
- Monitor for Hunter.io searches of your domain (they provide alerts)
- Watch for systematic enumeration of employee emails
- Track unusual patterns of social media profile views
- Alert on bulk scraping of public employee profiles
- Monitor for AI-generated phishing patterns (unusual personalization)
Prevention Strategies
Prevention Strategies
For Organizations:
- Limit publicly available employee information
- Train users to recognize personalized phishing attempts
- Implement email authentication (SPF, DKIM, DMARC)
- Use email security gateways with AI detection
- Monitor for reconnaissance activities via Hunter.io
- Educate employees about OSINT risks
- Consider limiting public employee directories
Limitations
- API Dependencies: Requires Hunter.io and Anthropic API keys
- Rate Limits: Subject to API rate limits from external services
- Data Quality: Profile quality depends on publicly available information
- Detection Risk: Hunter.io searches may alert target organizations
- Manual Review: Generated pretexts should be reviewed before use
- Legal Compliance: Must be used only for authorized red team engagements
Project Status
Current Features:- Domain discovery and DNS enumeration
- Contact discovery via Hunter.io
- Source scraping and HTML to Markdown conversion
- AI-powered profile generation
- AI-powered pretext generation
- Real-time updates via Socket.io
- SQLite data storage
- Dockerize the application with Docker Compose
- Page to manage prompt library
- User/Target info on the pretexts page for manual validation
- Add more sources for scraping
- Add more LLM providers
- Add more pretext templates
Disclaimer
This tool is designed for legitimate penetration testing and red teaming assessments. Always ensure compliance with privacy laws, email regulations, and terms of service of any integrated services. Use responsibly.
- Only use for authorized red team engagements
- Obtain proper authorization before reconnaissance
- Respect privacy laws and regulations
- Follow terms of service for Hunter.io and Anthropic
- Do not use for unauthorized phishing campaigns
- This is for personal use only and should be used responsibly and ethically