Skip to content

M0M0Sec/Momo-GhostBridge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ‘» MoMo-GhostBridge

Transparent Network Implant for Red Team Persistence

Drop it. Forget it. Own the network.
Invisible Bridge β€’ Reverse VPN β€’ DNS Tunneling β€’ Long-term Persistence

Version Platform Python License

Tests Coverage Build Code Style

Quick Start β€’ Features β€’ Architecture β€’ Hardware β€’ Ecosystem β€’ Docs


⚠️ DEVELOPMENT STATUS

This project is currently under active development and has not been tested in a live/production environment yet. Features are being implemented and may change. Use at your own risk and only in authorized test environments. Contributions and feedback are welcome!


πŸ“– Table of Contents


🎯 What is GhostBridge?

GhostBridge is a stealthy network implant designed for Red Team operations. It sits transparently between a network port and a target device (PC, printer, etc.), creating a persistent backdoor into the corporate network.

The Concept

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Wall Port  │─────▢│   GhostBridge   │─────▢│  Target Device  β”‚
β”‚  (Network)  β”‚      β”‚  (Invisible L2) β”‚      β”‚  (PC/Printer)   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                              β”‚
                              β”‚ Encrypted Tunnel
                              β–Ό
                     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                     β”‚   C2 Server     β”‚
                     β”‚  (Your VPS)     β”‚
                     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Why GhostBridge?

Challenge GhostBridge Solution
πŸ”Œ Physical access is brief βœ… 30-second drop & go deployment
πŸ” Network scans detect implants βœ… Layer 2 bridge - completely invisible
πŸ” VPNs get blocked by firewalls βœ… DNS tunnel fallback (port 53)
πŸ“ New MAC triggers alerts βœ… Clones target device MAC address
πŸ”‹ Needs external power βœ… Powers from target's USB port
πŸ“¦ Too large to conceal βœ… Smaller than a cigarette pack

✨ Key Features

πŸŒ‰ Network Stealth

  • Transparent L2 Bridge
  • MAC Address Cloning
  • No ARP Announcements
  • No Listening Ports
  • Traffic Timing Jitter

πŸ” Secure Tunneling

  • WireGuard VPN (Primary)
  • DNS Tunneling (Fallback)
  • Auto-Reconnect
  • Exponential Backoff
  • Multi-path Failover

πŸ›‘οΈ Anti-Forensics

  • RAM-only Logging
  • Secure Wipe on Panic
  • Fake Device Identity
  • Kill Switch
  • Encrypted Storage

πŸ”₯ Core Capabilities

Network Bridge - Click to expand
Feature Description Status
Transparent L2 Bridge Invisible to network scans, no IP address βœ…
MAC Cloning Automatically clones target device MAC βœ…
STP Disabled Fast convergence, stealth operation βœ…
Promiscuous Mode Full traffic visibility βœ…
Link Monitoring Auto-detect cable changes βœ…
802.1X Bypass Pass-through authentication πŸ”œ
Tunnel Management - Click to expand
Feature Description Status
WireGuard VPN Primary encrypted tunnel βœ…
DNS Tunneling Fallback when VPN blocked βœ…
Auto-Reconnect Persistent with exponential backoff βœ…
Health Monitoring Handshake age tracking βœ…
Multi-Server Failover between C2 endpoints βœ…
TCP/443 Mode WireGuard over HTTPS port πŸ”œ
DNS Tunneling (v0.6.0) - Click to expand
Feature Description Status
Base32/Hex Encoding DNS-safe data encoding βœ…
Zlib Compression Reduced query count βœ…
0x20 Randomization Case randomization for evasion βœ…
TXT/NULL Records Multiple record type support βœ…
Query Jitter Timing randomization βœ…
Rate Limiting Prevent detection by volume βœ…

Fallback Chain:

Priority Method Port Use Case
1 WireGuard UDP 51820 Primary - fastest
2 WireGuard TCP 443 Firewalled networks
3 DNS Tunnel 53 VPN blocked
4 Auto-restore - Return to primary
Stealth & Anti-Forensics - Click to expand
Feature Description Status
RAM Logging No persistent logs (tmpfs) βœ…
Log Suppression Automatic sensitive file cleanup βœ…
Secure Wipe Multi-pass overwrite on panic βœ…
Fake Identity Responds as "Netgear Switch" βœ…
Threat Detection Monitor for scanning tools βœ…
Kill Switch Remote self-destruct command βœ…
Encrypted Storage dm-crypt filesystem πŸ”œ
C2 Integration - Click to expand
Feature Description Status
Beacon Service Periodic heartbeat with jitter βœ…
Command Polling Receive commands from Nexus βœ…
Shell Execution Remote command execution βœ…
File Upload Exfiltrate data to C2 βœ…
Config Push Remote configuration updates βœ…
Health Reports System stats & diagnostics βœ…

πŸš€ Quick Start

One-Line Install

# Clone and install
git clone https://github.com/M0M0Sec/Momo-GhostBridge.git
cd Momo-GhostBridge
pip install -e ".[dev]"

# Verify installation
ghostbridge --version
ghostbridge test

Deploy to Device

# Generate configuration
ghostbridge config generate -o config.yml

# Edit with your C2 details
nano config.yml

# Deploy to NanoPi R2S
sudo ./scripts/deploy.sh "vpn.yourserver.com:51820" "SERVER_PUBKEY"

# Start service
ghostbridge run

Verify Operation

ghostbridge status          # Check system status
ghostbridge health          # Run health check
ghostbridge tunnel status   # Check tunnel connection

πŸ“¦ Installation

Prerequisites

Requirement Minimum Recommended
Hardware Orange Pi R1+ LTS NanoPi R2S Plus
OS Armbian / DietPi Armbian Bookworm
Python 3.11 3.12+
Network 2x Ethernet 2x Gigabit Ethernet
Storage 8GB SD 32GB eMMC

Method 1: Quick Install

# Clone repository
git clone https://github.com/M0M0Sec/Momo-GhostBridge.git
cd Momo-GhostBridge

# Create virtual environment
python3 -m venv .venv
source .venv/bin/activate

# Install with dependencies
pip install -e ".[dev]"

# Run tests
pytest tests/ -v

Method 2: Production Deployment

# Install system dependencies
sudo apt install -y wireguard-tools bridge-utils

# Install GhostBridge
pip install ghostbridge

# Copy configuration
sudo mkdir -p /etc/ghostbridge
sudo cp config/config.example.yml /etc/ghostbridge/config.yml

# Install systemd service
sudo cp services/ghostbridge.service /etc/systemd/system/
sudo systemctl enable --now ghostbridge

Method 3: Development Setup

# Clone with submodules
git clone --recursive https://github.com/M0M0Sec/Momo-GhostBridge.git
cd Momo-GhostBridge

# Install dev dependencies
pip install -e ".[dev]"

# Setup pre-commit hooks
pre-commit install

# Run full test suite
make test

# Run linting
make lint

πŸ—οΈ Architecture

System Overview

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                           GHOSTBRIDGE CORE                               β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚
β”‚  β”‚   Bridge    β”‚  β”‚   Tunnel    β”‚  β”‚   Beacon    β”‚  β”‚   Stealth   β”‚    β”‚
β”‚  β”‚   Engine    β”‚  β”‚   Manager   β”‚  β”‚   Service   β”‚  β”‚   Module    β”‚    β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜    β”‚
β”‚         β”‚                β”‚                β”‚                β”‚            β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                         INFRASTRUCTURE                                   β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚ Network  β”‚  β”‚WireGuard β”‚  β”‚   DNS    β”‚  β”‚  System  β”‚  β”‚    C2    β”‚  β”‚
β”‚  β”‚ Manager  β”‚  β”‚ Manager  β”‚  β”‚  Tunnel  β”‚  β”‚  (Wipe)  β”‚  β”‚  Client  β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Network Flow

                    CORPORATE NETWORK
                          β”‚
           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
           β”‚                             β”‚
    β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”              β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”
    β”‚   eth0      β”‚              β”‚     eth1      β”‚
    β”‚  (WAN)      β”‚              β”‚    (LAN)      β”‚
    β”‚ To Wall     β”‚              β”‚  To Target    β”‚
    β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜              β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜
           β”‚                             β”‚
           β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                      β”‚
               β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
               β”‚     br0     β”‚    ◄── Transparent Bridge
               β”‚  (Bridge)   β”‚        No IP Address
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                      β”‚
               β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
               β”‚     wg0     β”‚    ◄── Encrypted Tunnel
               β”‚ 10.66.66.x  β”‚        To C2 Server
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Directory Structure

ghostbridge/
β”œβ”€β”€ src/ghostbridge/
β”‚   β”œβ”€β”€ main.py                    # Main orchestrator
β”‚   β”œβ”€β”€ cli.py                     # Command line interface (Click)
β”‚   β”‚
β”‚   β”œβ”€β”€ core/                      # Core business logic
β”‚   β”‚   β”œβ”€β”€ config.py              # Pydantic configuration
β”‚   β”‚   β”œβ”€β”€ bridge.py              # L2 Bridge manager
β”‚   β”‚   β”œβ”€β”€ tunnel.py              # Tunnel orchestration
β”‚   β”‚   └── stealth.py             # Anti-forensics
β”‚   β”‚
β”‚   β”œβ”€β”€ infrastructure/            # Hardware & network abstraction
β”‚   β”‚   β”œβ”€β”€ network/               # iproute2 wrapper, bridge ops
β”‚   β”‚   β”œβ”€β”€ wireguard/             # WireGuard management
β”‚   β”‚   β”œβ”€β”€ dns/                   # DNS tunneling (NEW v0.6.0)
β”‚   β”‚   β”‚   β”œβ”€β”€ encoder.py         # Base32/Hex encoding
β”‚   β”‚   β”‚   β”œβ”€β”€ client.py          # Async DNS client
β”‚   β”‚   β”‚   └── tunnel.py          # DNS tunnel manager
β”‚   β”‚   └── system/                # RAM disk, secure wipe
β”‚   β”‚
β”‚   └── c2/                        # C2 communication
β”‚       β”œβ”€β”€ client.py              # MoMo API client
β”‚       β”œβ”€β”€ beacon.py              # Heartbeat service
β”‚       └── commands.py            # Command handlers
β”‚
β”œβ”€β”€ config/                        # Configuration templates
β”œβ”€β”€ scripts/                       # Deployment scripts
β”œβ”€β”€ services/                      # Systemd service files
β”œβ”€β”€ tests/                         # Test suite (87 tests)
β”‚   β”œβ”€β”€ test_bridge.py
β”‚   β”œβ”€β”€ test_tunnel.py
β”‚   β”œβ”€β”€ test_dns_tunnel.py
β”‚   └── ...
└── docs/                          # Documentation

πŸ“‘ Supported Hardware

Recommended Devices

Device CPU RAM Network Price Rating
NanoPi R2S Plus RK3328 Quad A53 1GB DDR4 2x Gigabit $45 ⭐⭐⭐
Orange Pi R1+ LTS RK3328 Quad A53 1GB DDR4 2x Gigabit $35 ⭐⭐⭐
NanoPi R4S RK3399 Hexa-core 4GB DDR4 2x Gigabit $75 ⭐⭐
PC Engines APU2 AMD GX-412TC 4GB DDR3 3x Gigabit $180 ⭐

Bill of Materials (~$60-75)

Item Purpose Cost
Orange Pi R1+ LTS / NanoPi R2S Main board $35-45
MicroSD Card 32GB (Class 10) OS + Storage $10
Short Ethernet Cable (30cm) LAN connection $3
USB-A to USB-C Cable Power from target $5
3D Printed Case (optional) Concealment $10

Form Factor

    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
    β”‚  β—‹ β—‹          β—‹ β—‹              β”‚
    β”‚ β”Œβ”€β”€β” β”Œβ”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”  NanoPi   β”‚
    β”‚ β”‚WAβ”‚ β”‚LAβ”‚   β”‚ USB-Cβ”‚  R2S      β”‚
    β”‚ β”‚N β”‚ β”‚N β”‚   β”‚      β”‚           β”‚
    β”‚ β””β”€β”€β”˜ β””β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”˜  55x52mm  β”‚
    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β–²     β–²       β–²
         β”‚     β”‚       β”‚
      To Wall  β”‚    Power from
               β”‚    Target USB
            To Target

βš”οΈ Attack Scenarios

Scenario 1: Printer Drop

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  PHYSICAL ACCESS: ~30 seconds                                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                  β”‚
β”‚  1. Enter office as "IT Support" or maintenance                  β”‚
β”‚  2. Find network printer in corner/hallway                       β”‚
β”‚  3. Unplug printer's ethernet from wall port                     β”‚
β”‚  4. Insert GhostBridge between wall and printer                  β”‚
β”‚  5. Power GhostBridge from printer's USB port                    β”‚
β”‚  6. Walk away - device auto-tunnels to your C2                   β”‚
β”‚                                                                  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”                  β”‚
β”‚  β”‚  Wall   │───▢│ GhostBridge │───▢│ Printer β”‚                  β”‚
β”‚  β”‚  Port   β”‚    β”‚   (hidden)  β”‚    β”‚         β”‚                  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜                  β”‚
β”‚                        β”‚                β”‚                        β”‚
β”‚                        β”‚    USB Power   β”‚                        β”‚
β”‚                        β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                        β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Scenario 2: Executive Desk

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  TARGET: C-Suite network segment                                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                  β”‚
β”‚  1. Social engineer access to executive floor                    β”‚
β”‚  2. Locate target's desk (after hours preferred)                 β”‚
β”‚  3. Install between wall port and docking station                β”‚
β”‚  4. GhostBridge clones docking station's MAC                     β”‚
β”‚  5. Full access to executive VLAN                                β”‚
β”‚                                                                  β”‚
β”‚  RESULT: Persistent access to sensitive network segment          β”‚
β”‚                                                                  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Scenario 3: Server Room

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  TARGET: Management network / Out-of-band access                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                  β”‚
β”‚  1. Gain brief physical access to server room                    β”‚
β”‚  2. Find unused switch port or KVM connection                    β”‚
β”‚  3. Deploy GhostBridge on management VLAN                        β”‚
β”‚  4. Access iLO/iDRAC/IPMI interfaces                             β”‚
β”‚                                                                  β”‚
β”‚  RESULT: Complete infrastructure control                         β”‚
β”‚                                                                  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

βš™οΈ Configuration

Main Configuration File

# /etc/ghostbridge/config.yml

# ═══════════════════════════════════════════════════════════════════
# Device Identity
# ═══════════════════════════════════════════════════════════════════
device:
  id: ghost-001                    # Unique device identifier
  name: "Office Printer Bridge"    # Human-readable name

# ═══════════════════════════════════════════════════════════════════
# Network Bridge
# ═══════════════════════════════════════════════════════════════════
network:
  bridge_name: br0
  wan_interface: eth0              # To wall port
  lan_interface: eth1              # To target device
  clone_mac: true                  # Clone target's MAC to WAN

# ═══════════════════════════════════════════════════════════════════
# Tunnel Configuration
# ═══════════════════════════════════════════════════════════════════
tunnel:
  type: wireguard
  interface: wg0
  endpoint: vpn.yourserver.com:51820
  keepalive: 25
  reconnect_delays: [5, 10, 30, 60, 300]

# ═══════════════════════════════════════════════════════════════════
# DNS Tunnel Fallback
# ═══════════════════════════════════════════════════════════════════
dns_tunnel:
  enabled: true
  domain: tunnel.yourserver.com
  nameservers: ["8.8.8.8", "1.1.1.1"]
  encoder: base32                  # base32, hex
  poll_interval: 30
  randomize_case: true             # 0x20 evasion

# ═══════════════════════════════════════════════════════════════════
# C2 Beacon
# ═══════════════════════════════════════════════════════════════════
beacon:
  enabled: true
  interval: 300                    # 5 minutes
  jitter: 60                       # Β±60 seconds randomization

c2:
  api_endpoint: "http://10.66.66.1:8082/api/ghostbridge"
  timeout: 30
  verify_ssl: true

# ═══════════════════════════════════════════════════════════════════
# Stealth Settings
# ═══════════════════════════════════════════════════════════════════
stealth:
  ramfs_logs: true                 # No persistent logs
  fake_identity: "Netgear GS105"   # Identity if probed
  panic_on_tamper: true            # Auto-wipe on detection

# ═══════════════════════════════════════════════════════════════════
# Logging
# ═══════════════════════════════════════════════════════════════════
logging:
  level: WARNING                   # DEBUG, INFO, WARNING, ERROR
  to_disk: false                   # NEVER in production
  max_lines: 1000

πŸ”§ CLI Reference

# ═══════════════════════════════════════════════════════════════════
# General Commands
# ═══════════════════════════════════════════════════════════════════
ghostbridge version                # Show version info
ghostbridge status                 # Show system status
ghostbridge health                 # Run health check
ghostbridge test                   # Run self-tests

# ═══════════════════════════════════════════════════════════════════
# Running GhostBridge
# ═══════════════════════════════════════════════════════════════════
ghostbridge run                    # Start full system
ghostbridge run -c /path/to/config # Custom config
ghostbridge start                  # Start bridge only
ghostbridge start --mode monitor   # Bridge + monitoring

# ═══════════════════════════════════════════════════════════════════
# Tunnel Management
# ═══════════════════════════════════════════════════════════════════
ghostbridge tunnel connect         # Connect VPN tunnel
ghostbridge tunnel disconnect      # Disconnect tunnel
ghostbridge tunnel reconnect       # Force reconnection
ghostbridge tunnel status          # Show tunnel status

# ═══════════════════════════════════════════════════════════════════
# Stealth Operations
# ═══════════════════════════════════════════════════════════════════
ghostbridge stealth wipe           # Wipe all logs
ghostbridge stealth check          # Check for threats
ghostbridge stealth status         # Show stealth status
ghostbridge stealth panic          # EMERGENCY WIPE (irreversible!)

# ═══════════════════════════════════════════════════════════════════
# Configuration
# ═══════════════════════════════════════════════════════════════════
ghostbridge config show            # Display current config
ghostbridge config generate -o f   # Generate template
ghostbridge config validate        # Validate config file

🌐 MoMo Ecosystem

GhostBridge is part of an integrated offensive security ecosystem:

                              ☁️ CLOUD LAYER
                    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                    β”‚  GPU Cracking  β”‚  Evilginx VPS  β”‚
                    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                     β”‚
                              β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
                              β”‚             β”‚
                              β”‚ 🟒 NEXUS    β”‚
                              β”‚ Central Hub β”‚
                              β”‚   v1.1.0    β”‚
                              β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜
                                     β”‚
     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
     β”‚               β”‚               β”‚               β”‚               β”‚
β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
β”‚         β”‚   β”‚             β”‚ β”‚             β”‚ β”‚             β”‚ β”‚             β”‚
β”‚πŸ”΅ MOMO  β”‚   β”‚πŸ‘»GHOSTBRIDGEβ”‚ β”‚  🎭 MIMIC   β”‚ β”‚ πŸ‘€ SHADOW   β”‚ β”‚   Future    β”‚
β”‚WiFi/BLE β”‚   β”‚   Network   β”‚ β”‚  USB Attack β”‚ β”‚ WiFi Recon  β”‚ β”‚  Projects   β”‚
β”‚  Pi 5   β”‚   β”‚   Implant   β”‚ β”‚  Pi Zero    β”‚ β”‚  Pi Zero    β”‚ β”‚     ...     β”‚
β”‚ v1.7.0  β”‚   β”‚   v0.6.0    β”‚ β”‚   v1.0.0    β”‚ β”‚   v0.1.0    β”‚ β”‚             β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Ecosystem Components

Project Description Platform Version Status
πŸ”΅ MoMo WiFi/BLE/SDR Audit Platform Raspberry Pi 5 v1.7.0 βœ…
🟒 Nexus Central C2 Hub & Dashboard Raspberry Pi 4 v1.1.0 βœ…
πŸ‘» GhostBridge Transparent Network Implant NanoPi R2S v0.6.0 βœ…
🎭 Mimic USB Attack Platform Pi Zero 2W v1.0.0 βœ…
πŸ‘€ Shadow Stealth WiFi Recon Device Pi Zero 2W v0.1.0 πŸ”œ

πŸ“š Documentation

Document Description
πŸ“– ARCHITECTURE.md Technical architecture & design
πŸš€ DEPLOYMENT.md Deployment & installation guide
πŸ” OPERATIONS.md Operational security & OPSEC
πŸ—ΊοΈ ROADMAP.md Development roadmap

πŸ“Š Project Status

Version Feature Status
v0.1.0 Core Infrastructure βœ…
v0.2.0 Bridge Engine βœ…
v0.3.0 WireGuard Tunnel βœ…
v0.4.0 Beacon Service βœ…
v0.5.0 Stealth Module βœ…
v0.6.0 DNS Tunneling βœ… NEW
v0.7.0 Encrypted Storage πŸ”œ
v0.8.0 802.1X Bypass πŸ”œ
v1.0.0 Production Ready πŸ”œ

Statistics:

  • πŸ“ 87 Tests passing
  • πŸ“Š 82% Coverage
  • πŸ”Œ 4 Core Modules
  • πŸ›‘οΈ 3 Tunnel Types

🀝 Contributing

Contributions are welcome! Please read our contributing guidelines.

Development Workflow

# Setup
git clone https://github.com/M0M0Sec/Momo-GhostBridge.git
cd Momo-GhostBridge
pip install -e ".[dev]"

# Test
pytest tests/ -v --cov=ghostbridge

# Lint
ruff check src/
mypy src/

# Format
black src/

Commit Convention

type(scope): description

Types: feat, fix, docs, style, refactor, test, chore

⚠️ Legal Disclaimer

GhostBridge is designed for authorized Red Team operations and security research only.

  • βœ… Only deploy on networks you own or have explicit written authorization to test
  • βœ… Unauthorized deployment is illegal in most jurisdictions
  • βœ… Always obtain proper authorization before any engagement
  • ❌ The developers are not responsible for misuse of this tool
  • ❌ Unauthorized network access is a criminal offense

πŸ“œ License

This project is part of the MoMo ecosystem and is licensed under the MIT License.


Part of the πŸ”₯ MoMo Ecosystem
Offensive Security Toolkit for Red Teams

πŸ”΅ MoMo β€’ 🟒 Nexus β€’ πŸ‘» GhostBridge β€’ 🎭 Mimic β€’ πŸ‘€ Shadow

Made with ❀️ by the MoMo Team

About

πŸ‘» Transparent Network Implant | L2 Bridge | WireGuard Tunnel | MAC Cloning | Stealth Persistence | NanoPi R2S | Part of MoMo Ecosystem

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors