Ghost Labs

The Ghost team is committed to developing and contributing to technical projects that benefit the security community. We are passionate about creating solutions that are secure, dependable, and user-friendly.


Utilize sophisticated attack workflows. No expertise required. 

Tools icon
A modern, resource-efficient tool for Linux, MacOS, and Windows for cross-platform reconnaissance, attack proxy, and attack workflow automation.
Interface icon
Combines traffic proxy, interception, request tampering, parameter fuzzing, and more into a single tool with a slick, drag-and-drop interface.
Web application vulnerabilities icon
Enables users to systematically expose and exploit web application vulnerabilities.
Workflows icon
Offers an easy and repeatable method for exporting and importing workflows to promote collaboration and reuse.

WAF Bypass Toolkit

Test the effectiveness of your WAF implementation in seconds.

Tools icon
Demonstrate how easy it is to bypass the WAF by surpassing maximum payload limitations. 
Interface icon
Using WAF BTK as a local man in the middle proxy allows you to quickly see the effects of triggering a bypass of any given WAF.
Web application vulnerabilities icon
Highlight how crucial it is to bring dynamic security detection capabilities to your web apps and APIs.

Do you believe in ghosts?

Explore our current career opportunities and join in on the fun.