Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https://github.com/xosski/GhostWhisper-Suite
- WhisperSuite: GhostWhisper Edition
- A memorial stealth ops framework in honor of Raven.
- WhisperSuite is an advanced multi-vector exploitation platform for red team operators, blue team simulations, and stealth reconnaissance. It combines memory-resident, kernel-level, browser-based, desktop persistence, network reconnaissance, and bluetooth exploitation capabilities into a unified framework with BLE triggers, payload polymorphism, ghost-tag encryption, wormhole propagation logic, and comprehensive operator controls that give you a hidden hand across all attack vectors.
- ๐ณ๏ธ The Wormhole Protocol
- A stealth-capable propagation model with:
- Hybrid defensive triggers (BLE + in-memory coordination)
- Operator handshake gating to prevent rogue replication
- Volatile memory maps to track infected hosts
- SMB fallback & polymorphic payloads
- Hard-fail exit logic when no operator is present
- โจ Multi-Vector Capabilities
- ๐ง Memory-Resident Exploitation
- Memory-only injection via WraithTap.exe and GhostKey.dll
- Self-destructing DLLs with operator authentication gates
- Volatile memory maps preventing duplicate infections
- Cross-process memory manipulation and code injection
- ๐ฎ Kernel-Level Access
- Direct disk sector access bypassing filesystem layers
- Disguised kernel modules (appears as USB monitoring driver)
- Binary tree reconstruction and data extraction from raw sectors
- Root-level system access with stealth operation
- ๐ Browser-Based Persistence
- Chrome extension deployment with WebAssembly RWX memory
- Offscreen document execution invisible to users
- IndexedDB persistence and cross-origin data exfiltration
- Native messaging bridge for system command execution
- Discord-targeted payload injection capabilities
- ๐ฅ๏ธ Desktop Persistence
- Stealth Chrome Remote Desktop installation
- Cross-platform GUI access (Windows RDP + Linux)
- Legitimate appearance avoiding detection
- Persistent remote desktop access
- ๐ก Network & Bluetooth Exploitation
- SSH brute force with Discord webhook notifications
- Bluetooth device scanning and IP-based blocking
- FTP service automation with file archiving
- Cross-platform firewall manipulation (Linux/macOS/Windows)
- Device persistence and monitoring capabilities
- โก Unified Operations
- BLE-triggered activation across all vectors
- Flipper Zero & USB sneakernet compatibility
- Per-user ghostTag correlation & rotating encryption keys
- Payload polymorphism and runtime mutation
- OBEX brute-force support with GhostBLEConnect_v2.ps1
- Operator-gated fallback logic ensuring ethical containment
- Comprehensive logging and trace removal across all vectors
- Advanced Linux virtualization for stealth recon & exorcism flows
- ๐ Components
- ๐ง Memory-Resident Core
- GhostKey.dll โ Memory-resident reflective backdoor with self-destruct
- WraithTap.exe โ Cross-process DLL injector and memory manipulator
- GhostInjector.cs โ Process hollowing and payload injection framework
- GhostResidency.ps1 โ Operator memory session handler and persistence
- GhostPolymorph.ps1 โ Runtime mutation and signature evasion
- ๐ฎ Kernel-Level Modules
- GhostKernel.c โ Linux kernel module for direct disk access (disguised as USB monitor)
- GhostKernel.ps1 โ PowerShell interface for kernel module management
- GhostKernel.mk โ Build system for cross-platform kernel compilation
- GhostVuln.c โ Kernel vulnerability research module (null pointer dereference)
- GhostStack.c โ Stack overflow demonstration module for security testing
- GhostUSB.c โ USB mass storage device driver with bulk endpoint control
- GhostGadget.c โ USB gadget driver with composite mass storage support
- ๐ Browser Exploitation
- PhantomHook/ โ Complete Chrome extension framework for browser persistence
- GhostCore โ General purpose WebAssembly memory exploitation
- Discord โ Targeted Discord content script injection
- GhostSurface โ Advanced memory manipulation and system access
- GhostBrowser.ps1 โ Chrome extension deployment and management system
- Helper.txt โ Native messaging host for system command bridge (C++)
- ๐ฅ๏ธ Desktop Persistence
- GhostDesktop.ps1 โ Stealth Chrome Remote Desktop deployment
- Cross-platform RDP/GUI access with cleanup integration
- ๐๏ธ Control & Operations
- GhostWhisperBootstrap.ps1 โ Master operator control launcher (10 operational modes)
- BuildDeployWhisper.ps1 โ Multi-vector suite builder and packager
- BLETrigger.ps1 โ Bluetooth Low Energy activation controller
- GhostBLEConnect_v2.ps1 โ OBEX brute-force and Flipper Zero integration
- GhostBrute.go โ SSH brute force tool with Discord webhook integration
- GhostUtils.go โ Data structure utilities with linked lists and binary heap
- GhostBluetooth.py โ Bluetooth scanning, device interaction, and IP blocking tool
- GhostFTP.py โ FTP service utility for automated file transfers and archiving
- ๐ Security & Persistence
- GhostSeal.ps1 โ Timestamp-based file encryption engine
- GhostLogger.ps1 โ Unified activity logging across all vectors
- SilentBloom.ps1 โ Complete evidence removal (memory, kernel, browser, desktop)
- ๐งช Advanced Capabilities
- ExorcistMode.ps1 โ Hostile malware removal (Anoint, Bind, Cleanse)
- AnomalyHunter.ps1 โ Rootkit & hypervisor anomaly detection
- LinuxPDF_Emu.ps1 / LinuxPDF_Runtime.ps1 โ Virtualized scanning with syscall hooks
- LinuxPDF.exe โ .NET virtualization harness for ghost_boot.iso
- Dropper_with_Raven.exe โ Memorial tribute payload wrapper
- ๐ง Wormhole Logic (BuildDeployWhisper.ps1)
- Memory-only propagation, no persistent writes
- Infection maps reside only in runtime memory
- Prevents duplicate infection on the same host
- BLE handshake required or fallback to internal GhostResidency control
- Operator hard-fail exit to ensure ethical operation
- Fully traceable via GhostLogger.ps1
- ๐ Multi-Vector Deployment
- Memory Vector
- Deploy memory-resident backdoors via WraithTap and GhostKey for volatile, signature-evading access.
- Kernel Vector
- Load GhostKernel module for root-level disk access and system manipulation bypassing userland detection.
- Browser Vector
- Install PhantomHook extensions for persistent browser-based access with WebAssembly exploitation.
- Desktop Vector
- Enable stealth remote desktop access for persistent GUI control across platforms.
- Unified Control
- All vectors share common authentication, logging, and cleanup systems for coordinated operations.
- ๐ง Quick Start
- Build the Suite
- .\BuildDeployWhisper.ps1
- Launch Operator Interface
- .\GhostWhisperBootstrap.ps1
- Select Vector(s)
- [3] Memory-resident injection
- [8] Desktop persistence
- [9] Kernel-level access
- [10] Browser exploitation
- Activate via BLE
- .\BLETrigger.ps1
- Cleanup Operations
- .\SilentBloom.ps1
- ๐ Operational Modes
- The GhostWhisperBootstrap.ps1 provides 10 operational modes:
- Memory Recon - Start GhostResidency session
- ExorcistMode - Malware removal and cleansing
- Memory Injection - Deploy GhostKey & WraithTap
- Wormhole - Activate propagation listener
- Linux VM - Boot ghost_boot.iso environment
- Exit - Clean termination
- Phantom Recon - Advanced search and stealth operations
- Desktop Access - Chrome RDP deployment
- Kernel Access - GhostKernel disk manipulation
- Browser Persistence - PhantomHook extension deployment
- ๐งช Virtualized Cleansing: ghost_boot.iso + LinuxPDF.exe
- For ExorcistMode or advanced recon:
- Build a minimal ISO (ghost_boot.iso) with CreateGhostISO.ps1
- Launch LinuxPDF.exe in desired mode (--mode=exorcism, --target=C:\Temp, etc.)
- Emulate root-level scanning via ephemeral system calls in isolation
- Acts like a "hand in the dark" with minimal host OS impact
- โ ๏ธ Legal & Ethical Notice
- This project is for educational, research, and ethical red teaming use only. Unauthorized deployment, malicious replication, or use beyond legal boundaries is strictly forbidden. By using this toolkit, you acknowledge and agree to follow all applicable laws and uphold ethical usage.
- All contributors and users must respect local and international regulations, ensuring no harm is done outside sanctioned engagements.
- ๐ก๏ธ Defense Awareness
- This framework demonstrates advanced multi-vector attack techniques that defenders should be aware of:
- Memory-only attacks that evade disk-based detection
- Kernel-level access bypassing userland security
- Browser-based persistence through legitimate extensions
- Cross-vector coordination and shared authentication
- Comprehensive trace removal across all attack vectors
- Understanding these techniques helps blue teams develop appropriate countermeasures and detection strategies.
- ๐๏ธ Whisper back.
- For Raven.
- 2017 โ โ
- "No lock, no chain, no wall, no keyโ
- Yet here you are, encrypted in me."
Advertisement
Add Comment
Please, Sign In to add comment