Skip to main content

Defensive-offensive cybersecurity and networking analysis toolkit

Project description

Phantomwire

PyPI CI Coverage

Phantomwire is a defensive-offensive cybersecurity toolkit focused on auditable operations. It offers HTTP/TLS/JWT analysis, lightweight PCAP summarisation, DNS inspection, and a plugin system for custom checks. All active operations require explicit consent to ensure safe and ethical usage.

Features

  • Unified evidence model (Target → Evidence → Finding) for consistent reporting.
  • Safe-mode with explicit consent tokens controlling network operations.
  • HTTP security header analysis, TLS certificate auditing, JWT linting, and PCAP sessionisation.
  • Reporting in JSON, Markdown, and SARIF for integration with CI pipelines.
  • Plugin framework discoverable via entry points.
  • Minimal dependencies with optional extras for advanced capabilities.

Safety Model

Phantomwire never performs active network operations unless both of the following are true:

  1. The target host is within the configured allowed scopes.
  2. The environment variable PHANTOMWIRE_CONSENT is set to I_HAVE_PERMISSION.

Use phantom --consent --allowed-scope example.org ... to opt in for the current process. Always secure evidence, keep logs, and ensure legal authorization before operating on any non-lab environment.

Installation

pip install phantomwire
# optional extras
pip install "phantomwire[web,crypto,pcap,dns]"

Quickstart

# Analyze HTTP headers
phantom --consent --allowed-scope example.com scan http https://example.com

# Audit TLS configuration
phantom --consent --allowed-scope example.com audit tls example.com:443

# Lint a JWT token
phantom jwt lint "<token>"

# Inspect a PCAP file
phantom inspect pcap sample.pcap

# Generate Markdown report
phantom --consent --allowed-scope example.com --format md --output report.md scan http https://example.com

Reporting Formats

{
  "target": {"locator": "https://example.com"},
  "findings": [
    {"id": "HTTP-H-001", "severity": "Medium", "title": "Missing strict-transport-security header"}
  ]
}
# Phantomwire Security Report

| ID | Severity | Title |
| --- | --- | --- |
| HTTP-H-001 | Medium | Missing strict-transport-security header |

SARIF output is compatible with GitHub Advanced Security and other CI systems.

CLI Overview

Run phantom --help for full usage. Top-level commands include:

  • scan http <url> — HTTP security headers.
  • audit tls <host>:<port> — TLS certificate and cipher checks.
  • jwt lint <token> — JWT claim analysis and signature verification.
  • inspect pcap <path> — Sessionize PCAP captures.
  • dns resolve <host> — Consent-gated DNS lookups.
  • plugins list|run — Discover or execute plugins.

Exit codes: 0 success, 2 when high-severity findings exist, 1 for operational errors.

Development

git clone https://github.com/thesmartshadow/phantomwire.git
cd phantomwire
pip install -e .[dev]
pre-commit install
pytest

Use python -m build to create release artifacts. Pull requests must pass ruff, mypy, and pytest on Python 3.10+.

Ethical Use

Phantomwire is designed for responsible security testing. Do not use it on systems you do not own or operate without written permission. Evidence collection is auditable and should be stored securely to prevent misuse.

License

MIT License. See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

phantomwire-0.1.1.tar.gz (22.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

phantomwire-0.1.1-py3-none-any.whl (26.0 kB view details)

Uploaded Python 3

File details

Details for the file phantomwire-0.1.1.tar.gz.

File metadata

  • Download URL: phantomwire-0.1.1.tar.gz
  • Upload date:
  • Size: 22.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for phantomwire-0.1.1.tar.gz
Algorithm Hash digest
SHA256 afa7f965491804f86de300f52eaec4fb993bf7992b2113d8323d168428e36fe3
MD5 bc9a4d906779381a6ff9a0dd4068d596
BLAKE2b-256 48313b03d6c1dbe8a6cade6cef20038aa37b938f17610bd6ae0266ab05c869c6

See more details on using hashes here.

Provenance

The following attestation bundles were made for phantomwire-0.1.1.tar.gz:

Publisher: publish.yml on thesmartshadow/phantomwire

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file phantomwire-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: phantomwire-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 26.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for phantomwire-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4d1637c377097cf66c16465df9f819daa82838afee38656a1287e170b0d9797a
MD5 d3617d7ff7d81a777ccaebf3aa3e1e9f
BLAKE2b-256 791d586900bfa85da560c71e68ed666dd5d8f799cbdef69bec53bd0ca98e64d5

See more details on using hashes here.

Provenance

The following attestation bundles were made for phantomwire-0.1.1-py3-none-any.whl:

Publisher: publish.yml on thesmartshadow/phantomwire

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page