Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- github.com/xosski/Stolen-Treasures-Of-The-High-Seas/tree/main/Orignal%20Works/Ghost
- π₯ Deployment Tactic:
- Method How
- π© Email Embed <img src="https://yourserver.com/beacon.html">
- π CDN Ad Slot Serve beacon.html as iframe from CDN
- 𧬠Malicious Package Embed in Electron/Webview apps
- β οΈ Red Team Notes:
- This doesn't exploit anything. It's using:
- Standard browser behavior
- Expected fetches (image/iframe)
- Legit storage APIs
- Yet it creates:
- Persistent local state
- Potential for delayed payload execution
- βThe ghost doesnβt scream through the window. It waits behind the wallpaper.β
- # π―οΈ GhostCore: Beacon-Based Payload Delivery (PoC)
- > "The payload was never clicked. It was remembered."
- ## π Overview
- This proof-of-concept demonstrates a **zero-interaction payload delivery mechanism** using common web technologies and browser behavior.
- The mechanism leverages:
- - π© Remote image loading (e.g., from email clients like Outlook, Gmail, etc.)
- - 𧬠IndexedDB for persistent, silent payload storage
- - π§ Optional service worker registration for long-term background control
- No exploits. No alerts. No clicks.
- Just **presence.**
- ---
- ## π οΈ Structure
- | File | Purpose |
- |-------------------|---------|
- | `beacon.html` | Loads a visual image and silently spawns `payload.html` |
- | `ad.jpg` | The legitimate image (visual disguise) |
- | `payload.html` | Hidden iframe that stores a stealth payload in IndexedDB |
- | `service-worker.js` (optional) | Background intercept layer for persistent control |
- | `README.md` | You're here. Welcome to the GhostCore era. |
- ---
- ## π§ How It Works
- 1. **beacon.html** is served as an ad, image embed, or preloaded email asset.
- 2. It displays a normal image, while silently injecting an iframe.
- 3. The iframe runs `payload.html`, which:
- - Fingerprints the device
- - Stores a small JavaScript payload into **IndexedDB**
- 4. (Optional) It also registers a **service worker** that can intercept future traffic.
- > Payloads persist even after the tab closes.
- > The user never interacts. The browser does.
- ---
- ## π Real-World Delivery Vectors
- - πΌοΈ Embedded in `<img src="...">` within emails
- - π¦ Delivered via ad networks / affiliate slots
- - π§· Injected via browser extensions or PDFs
- - π‘ CDN spoofing with valid certs (advanced)
- ---
- ## π¦ Sample Payload Stored
- ```js
- {
- tag: 'ghost',
- deliveredAt: '2025-08-30T20:11:45.000Z',
- content: 'console.log("π₯ GhostCore activated");'
- }
- You can modify payload.html to encrypt, chain-load, or conditionally execute payloads from remote servers, Tor endpoints, etc.
- π§Ό Cleanup Instructions
- To remove the payload from a user's device:
- Open DevTools β Application β IndexedDB β ghostcore β Delete
- Remove any associated Service Workers via navigator.serviceWorker.getRegistrations()
- β οΈ Ethics & Warning
- This project is for educational, research, and red-team purposes only.
- Do not deploy in the wild.
- Do not weaponize this code.
- Do not mistake silence for permission.
- 𧬠GhostCore Philosophy
- We do not breach.
- We wait in places others forgot to check.
- If the light leaks from the cracks β we listen.
- Welcome to GhostCore.
Add Comment
Please, Sign In to add comment