npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

ghost-link

v15.0.9

Published

Secure, serverless P2P terminal chat protocol

Readme

◢◤ GHOST-LINK V.15.0.5

Ghost-Link is a decentralized, peer-to-peer (P2P) terminal communication suite designed for secure, ephemeral, and encrypted data exchange. It operates without a central server, utilizing a Distributed Hash Table (DHT) to establish direct connections between nodes.

Key Features

Serverless Protocol: No central authority or data logging. Connections are made node-to-node. AES-256-GCM Encryption: Every session uses unique, cryptographically derived keys to ensure end-to-end privacy. Ephemeral Identity: No accounts and no traces. All session data is stored in memory and wiped upon termination. Secure File Sync: Integrated P2P file and directory sharing with SHA-256 integrity verification. Dynamic Frequency Shifting: Owners can shift the entire group to a new room code instantly. Administrative Control: The first node to initialize a frequency gains Origin (Owner) status to lock rooms or manage peers.

INSTALLATION & LAUNCH

Ensure you have Node.js installed on your system. Install the Ghost-Link suite globally via NPM : npm i -g ghost-link Note: macOS/Linux users may require sudo for elevated privileges.

EXECUTION To start the protocol, simply run the global command: ghost-link

HOW TO USE

1. INITIALIZATION SEQUENCE Upon launch, the terminal will prompt you for two parameters: IDENT: Enter your temporary alias (e.g., Shadow), or leave it blank and press ENTER to generate a random alias. FREQ: Enter a specific room code to join an existing session, or generate custom frequency in format [X.XXX.XXX.XXX.XXX.XXX.X] (Example : 1.345.222.445.991.666.1) or leave it blank and press ENTER to generate a new, private frequency.

2. MESSAGING & COMMANDS Once the signal is stabilized, you can type messages normally or use specialized commands: <help> - Displays all available commands. <share> [path]- Requests to send a file or folder to the peers. <reply:ID> [msg]- Targets a specific message ID to create a threaded reply. <peers>- Lists all currently manifested nodes on the frequency. <clear> - Wipes the current terminal chat history. <leave>- Gracefully disconnects your node from the swarm.

3. OWNER-ONLY COMMANDS (ORIGIN NODE) The session creator has access to elevated protocol controls: <lock>: Prevents new nodes from joining the frequency. <unlock>: Opens the frequency for new connections. <kick> . : Opens a menu to terminate a specific peer's connection. <end> : Sends a global kill-signal to dissolve the session for
everyone.

FILE TRANSFERS

Files are automatically saved to your system's default Downloads folder under a directory named Ghost-Link.

Integrity: Files are hashed during transit. If the SHA-256 hash does not match upon arrival, the transfer is marked as corrupt.

Directories: Ghost-Link automatically packages, transfers, and extracts folders seamlessly.

SECURITY ARCHITECTURE

Ghost-Link utilizes a Zero-Trust model to ensure digital sovereignty:

1. Key Derivation: Room codes are processed via scrypt with a hardened armor salt (v2 ghost-link-v15-hardened-armor-salt). The derivation uses a memory-hard cost factor (N: 65536) to effectively neutralize brute-force and hardware-accelerated attacks.

2. Packet Hardening: Every transmission is a cryptographically signed Buffer containing a 12-byte random IV and a 16-byte Auth Tag. To prevent delayed interception, the system implements a 60-second TTL (Time-To-Live); any packets exceeding this age are automatically rejected.

3.Replay Protection: The system maintains a sliding window of seenNonces. Duplicate nonces are identified and dropped instantly, preventing "Ghost-in-the-Middle" replay injections.

4. Rate Limiting: An autonomous Lockdown mechanism monitoring chat frequency. If a node exceeds 5 packets per 2 seconds, the terminal enters a 10-second freeze to protect the frequency from spam-based resource exhaustion.

ABOUT THIS PACKAGE

The "Shadow Network" Paradigm Ghost-Link represents a shift away from "Cloud-First" communication toward "Local-First" Sovereignty. While modern messengers claim encryption, they still rely on centralized servers to handshake connections and store metadata. Ghost-Link eliminates the middleman entirely. It doesn't just encrypt your data; it makes the data's path through the internet unpredictable and invisible to traditional monitoring.

Deep Intelligence & Autonomous Networking Beyond simple chat, Ghost-Link features an Autonomous Origin Protocol. If a session creator (the Origin Node) disconnects, the network intelligently "promotes" the next most stable node to administrative status. This ensures that the frequency remains managed and secure without ever needing a central server to oversee the transition. Its "Gossip" mechanism ensures that even if packet loss occurs, the network heals itself by re-broadcasting missing data through alternative peer paths.

Why Developers and Power Users Love It 1. Instant Secure Tunnels: Bypass complex VPN setups or firewall port-forwarding. Ghost-Link’s hole-punching capability allows for instant connectivity between nodes in different geographic regions or restricted office networks.

2. Zero-Footprint Auditing: Ideal for red-teamers and security researchers who need to share payloads or logs during an engagement without leaving a trace on the client's internal communication tools.

3. DevOps "War Rooms": Spin up a high-encryption frequency in seconds for emergency server troubleshooting. Share .env files or SSH keys directly from RAM to RAM, ensuring they never touch a hard drive or a third-party server.

4. Hardware Minimalism: Despite its power, the package is a lightweight, single-file script. It runs as easily on a $5 Raspberry Pi as it does on a high-end workstation.

The Future of "Ghost" Connectivity Ghost-Link is more than a utility; it is a proof-of-concept for the Decentralized Web (dWeb). By leveraging Distributed Hash Tables (DHT) and military-grade authenticated encryption (AES-GCM), it provides a level of privacy that was previously only accessible to those with deep technical knowledge of network tunneling.

Historically, true digital sovereignty was a privilege reserved for the elite few with the technical depth to tunnel through the noise; with Ghost-Link, absolute privacy is no longer a complex pursuit—it is a single command away.