Call to action → I’m open for software contracts focused on security, scraping, or threat-intel.
Hire me → let’s talk →
🩻 Problem
After a breach, victims rarely know where or how their data was exposed. Existing tools rely on static dumps or pay-walled APIs.
🔨 Solution
GhostRoute · Data-Breach Scanner crawls public leaks, pastebins, and dark-web forums via Tor in real-time, returning a structured JSON record under one second per query.
Pipeline Overview
- Ingest workers (Python Scrapy + WebARC) scrape 100+ onion / clearnet sources.
- RabbitMQ (
pika
) queues raw dumps. - Parser workers normalise data → PostgreSQL.
- FastAPI gateway exposes
/scan
endpoint + Web UI. - Redis caches hot queries (95 % hit rate).
Sample API Response
{
"name": "",
"email": "",
"username": "",
"ip_address": "",
"password": "",
"hashed_password": "",
"vin": "",
"license_plate": "",
"address": "",
"phone": "",
"social": "",
"cryptocurrency_address": "",
"domain": "",
"database_name": ""
}
Current Impact
- 30 alpha users running weekly scans
- Typical single-asset lookup < 1 s
- Successfully detected credentials from recent public dumps within minutes of release
Roadmap
- File-hash & takedown-notice automation
- Re-enable facial-recognition module once infra budget allows
Demo
🚀 Hire Me
Looking for a contractor to build scraping pipelines, threat-intel feeds, or security dashboards?
Say hello →