The Ultimate Tor Hidden Service Manager & Dark Net Intelligence Dashboard
Deploy entirely self-hosted, secure .onion sites in seconds with automated multi-threading, dynamic Nginx routing, and integrated Vanity URL generation.
Ghost Bullet takes the complex, error-prone process of manually configuring Tor hidden services and transforms it into a sleek, automated, cyberpunk-styled dashboard. Built with Docker, Flask, and Nginx, Ghost Bullet allows you to spin up multiple .onion websites instantly, either by uploading .zip archives directly to the built-in host, or by proxying traffic to your existing containers.
Stop wrestling with torrc configurations, chown permissions, and broken symlinks. Ghost Bullet handles the invisible network layer so you can focus on building.
- Instant Deployment: Go from a ZIP file to a live V3
.onionlink in under 10 seconds. - Advanced Vanity URLs: Integrated
mkp224oworker cluster automatically brute-forces custom.onionprefixes in the background. - Dynamic Routing: Built-in Nginx container seamlessly serves dozens of hidden services simultaneously with zero port conflicts.
- Cyberpunk UI: A gorgeous, dark-mode administrative dashboard for absolute control over your Tor nodes.
- Live File Management: View, edit, and delete hosted site files directly through the dashboard interface.
- Container Proxying: Easily bind new Tor links to any pre-existing Docker container on your server.
Enhance your Ghost Bullet installation with advanced offensive and defensive intelligence capabilities. Upgrade to Premium to unlock the top navigation modules:
- 🛡️ Vulnerability Scanner For Tor: Scan remote Onion addresses for exposed CVEs, misconfigurations, and standard web vulnerabilities aggressively.
- 🗄️ Breach Data On Dark Net: Search massive indexed archives of breached credentials, stolen data, and leaked databases natively from the dashboard.
- ✅ Validate Sites: Automatically ping and verify the uptime, signature, and health of thousands of external Onion URLs simultaneously.
- 🐛 Last Exploits: Real-time scraping engine monitoring underground forums for zero-days, new exploits, and active malware trends.
Ghost Bullet is entirely containerized. You only need Docker and Docker Compose installed on your host system.
git clone https://github.com/chadi0x/GhostBullet.git
cd GhostBulletcp .env.example .env
# Edit .env if you wish to change default ports or database settingsdocker compose up -d --buildGhost Bullet will compile the Vanity worker, initialize the database, configure Nginx, and establish a live connection to the Tor network.
Open your local browser to: http://localhost:8008
- Click DEPLOY SITE in the top navigation bar.
- Select Built-in (Nginx).
- Once the Node is created, click the green UPLOAD button on the node card.
- Select a
.ziparchive containing yourindex.htmland assets. Ghost Bullet will instantly extract them and route the Tor traffic.
Click the purple MANAGE FILES button on any active node to open the File Manager. From here, you can verify file extraction sizes and delete specific .html or image assets without wiping the entire node.
Click the blue REWRITE FILES button to completely replace an existing node with a fresh .zip payload, while retaining the exact same .onion address.
Our group actively builds 100+ projects targeting multi-service architectures and dark net integrations. Most of our advanced, large-scale projects are not free.
If you need a specific custom project, tailored cybersecurity tool, or specialized infrastructure, reach out to me directly on Telegram: @hisoka0morow.
Ghost Bullet is provided strictly for educational purposes, security research, and legitimate privacy preservation. Tor is a privacy tool, not a criminal one.
The developer (chadi0x) is not responsible for any misuse, damage, or illegal activities conducted using this software. We do not endorse or support the use of Ghost Bullet to host illegal content or services. By using this software, you take full responsibility for your actions and how you choose to use it. Always ensure you have explicit permission before scanning or interacting with third-party hidden services.
Developed with ❤️ by chadi0x