Skip to main content

Defensive-offensive cybersecurity and networking analysis toolkit

Project description

Phantomwire

PyPI CI Coverage

Phantomwire is a defensive-offensive cybersecurity toolkit focused on auditable operations. It offers HTTP/TLS/JWT analysis, lightweight PCAP summarisation, DNS inspection, and a plugin system for custom checks. All active operations require explicit consent to ensure safe and ethical usage.

Features

  • Unified evidence model (Target → Evidence → Finding) for consistent reporting.
  • Safe-mode with explicit consent tokens controlling network operations.
  • HTTP security header analysis, TLS certificate auditing, JWT linting, and PCAP sessionisation.
  • Reporting in JSON, Markdown, and SARIF for integration with CI pipelines.
  • Plugin framework discoverable via entry points.
  • Minimal dependencies with optional extras for advanced capabilities.

Safety Model

Phantomwire never performs active network operations unless both of the following are true:

  1. The target host is within the configured allowed scopes.
  2. The environment variable PHANTOMWIRE_CONSENT is set to I_HAVE_PERMISSION.

Use phantom --consent --allowed-scope example.org ... to opt in for the current process. Always secure evidence, keep logs, and ensure legal authorization before operating on any non-lab environment.

Installation

pip install phantomwire
# optional extras
pip install "phantomwire[web,crypto,pcap,dns]"

Quickstart

# Analyze HTTP headers
phantom --consent --allowed-scope example.com scan http https://example.com

# Audit TLS configuration
phantom --consent --allowed-scope example.com audit tls example.com:443

# Lint a JWT token
phantom jwt lint "<token>"

# Inspect a PCAP file
phantom inspect pcap sample.pcap

# Generate Markdown report
phantom --consent --allowed-scope example.com --format md --output report.md scan http https://example.com

Reporting Formats

{
  "target": {"locator": "https://example.com"},
  "findings": [
    {"id": "HTTP-H-001", "severity": "Medium", "title": "Missing strict-transport-security header"}
  ]
}
# Phantomwire Security Report

| ID | Severity | Title |
| --- | --- | --- |
| HTTP-H-001 | Medium | Missing strict-transport-security header |

SARIF output is compatible with GitHub Advanced Security and other CI systems.

CLI Overview

Run phantom --help for full usage. Top-level commands include:

  • scan http <url> — HTTP security headers.
  • audit tls <host>:<port> — TLS certificate and cipher checks.
  • jwt lint <token> — JWT claim analysis and signature verification.
  • inspect pcap <path> — Sessionize PCAP captures.
  • dns resolve <host> — Consent-gated DNS lookups.
  • plugins list|run — Discover or execute plugins.

Exit codes: 0 success, 2 when high-severity findings exist, 1 for operational errors.

Development

git clone https://github.com/thesmartshadow/phantomwire.git
cd phantomwire
pip install -e .[dev]
pre-commit install
pytest

Use python -m build to create release artifacts. Pull requests must pass ruff, mypy, and pytest on Python 3.10+.

Ethical Use

Phantomwire is designed for responsible security testing. Do not use it on systems you do not own or operate without written permission. Evidence collection is auditable and should be stored securely to prevent misuse.

License

MIT License. See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

phantomwire-0.1.0.post2.tar.gz (22.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

phantomwire-0.1.0.post2-py3-none-any.whl (26.1 kB view details)

Uploaded Python 3

File details

Details for the file phantomwire-0.1.0.post2.tar.gz.

File metadata

  • Download URL: phantomwire-0.1.0.post2.tar.gz
  • Upload date:
  • Size: 22.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for phantomwire-0.1.0.post2.tar.gz
Algorithm Hash digest
SHA256 3774a2e6d4e30d133fd76a08ba6d74c393ad31d77597aa3feea934bab13cea46
MD5 0fbe82db1c97b12f22af607da3ada90b
BLAKE2b-256 edd1ee99df618225f16e7d72abc6daa7b0848a32876c35d6de4f614b6a87b1b8

See more details on using hashes here.

Provenance

The following attestation bundles were made for phantomwire-0.1.0.post2.tar.gz:

Publisher: publish.yml on thesmartshadow/phantomwire

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file phantomwire-0.1.0.post2-py3-none-any.whl.

File metadata

File hashes

Hashes for phantomwire-0.1.0.post2-py3-none-any.whl
Algorithm Hash digest
SHA256 59b0f4c0a0c8e7e55751e732fb624577a3b942afab0e02f0b9a9a2ce0c8cc41a
MD5 0f8883900c660627fc05f9ceb5457f85
BLAKE2b-256 e9d7c92611711f08b6dfd11ddb9c1eab9d18d12e782c8a16ea8d7f9a4b9b4f04

See more details on using hashes here.

Provenance

The following attestation bundles were made for phantomwire-0.1.0.post2-py3-none-any.whl:

Publisher: publish.yml on thesmartshadow/phantomwire

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page