Call to action → I’m open for software contracts focused on security, scraping, or threat-intel.
Hire me → let’s talk →


🩻 Problem

After a breach, victims rarely know where or how their data was exposed. Existing tools rely on static dumps or pay-walled APIs.

🔨 Solution

GhostRoute · Data-Breach Scanner crawls public leaks, pastebins, and dark-web forums via Tor in real-time, returning a structured JSON record under one second per query.

Pipeline Overview

  1. Ingest workers (Python Scrapy + WebARC) scrape 100+ onion / clearnet sources.
  2. RabbitMQ (pika) queues raw dumps.
  3. Parser workers normalise data → PostgreSQL.
  4. FastAPI gateway exposes /scan endpoint + Web UI.
  5. Redis caches hot queries (95 % hit rate).

Sample API Response

{
                "name": "",
                "email": "",
                "username": "",
                "ip_address": "",
                "password": "",
                "hashed_password": "",
                "vin": "",
                "license_plate": "",
                "address": "",
                "phone": "",
                "social": "",
                "cryptocurrency_address": "",
                "domain": "",
                "database_name": ""
}

Current Impact

  • 30 alpha users running weekly scans
  • Typical single-asset lookup < 1 s
  • Successfully detected credentials from recent public dumps within minutes of release

Roadmap

  • File-hash & takedown-notice automation
  • Re-enable facial-recognition module once infra budget allows

Demo

YouTube thumbnail for the GhostRoute Data Breach Scanner demo, showcasing the cybersecurity tool.


🚀 Hire Me

Looking for a contractor to build scraping pipelines, threat-intel feeds, or security dashboards?
Say hello →