TOP SECRET // CODEWORD: GHOST CELL
■ CLASSIFICATION: TOP SECRET

GHOST

CELL

36
COMMANDS
6
MISSIONS
4
THREAT LEVELS
LIVE
RED TEAM AI
GHOST CELL v0.1.0 // MISSION: BERLIN-7 // THREAT: ALPHA
operator@ghost-relay-A1B2C:~$ wg genkey | tee /etc/wireguard/node.key | wg pubkey > /etc/wireguard/node.pub
> KEY_GEN PHASE COMPLETE ══════
operator@ghost-relay-A1B2C:~$
▼ SCROLL
// SYSTEM CAPABILITIES

Operational Feature Set

Built for those who understand that realistic tradecraft simulation requires uncompromising technical authenticity.

AUTHENTIC TRADECRAFT

36-Command Sequence

Execute a real-world covert infrastructure deployment sequence: WireGuard mesh networking, TLS certificate chains, iptables hardening, encrypted backup exfiltration, and forensic sanitization. Every command matters.

wg genkey / wg set
openssl x509 / req
iptables -P INPUT DROP
shred -vfz -n 3
ADVERSARIAL ENGINE

Live RED TEAM AI

A persistent adversarial sweep engine hunts your network in real time. Sweep zones advance across the map, suspicion accumulates, nodes get burned. One mistake and attribution is imminent.

Dynamic sweep zones
SIGINT correlation attacks
HUMINT threat triggers
Attribution cascade
TECHNICAL FIDELITY

Real Network Protocols

No abstractions. Every protocol is simulated with technical fidelity: WireGuard VPN tunnels, mTLS mutual authentication, GPG payload encryption, SCP exfiltration with key-based auth.

WireGuard mesh tunnels
mTLS handshake verification
GPG payload encryption
SSH session management
// OPERATIONAL CYCLE

How It Works

Four operational phases. Each requires precise execution. Failure in any phase cascades to attribution.

PHASE 01

DEPLOY

Place ENTRY, RELAY, DEAD_DROP, BRIDGE, and EXIT nodes on the city map. Build your covert infrastructure topology before the timer starts.

PHASE 02

BACKUP

Encrypt and exfiltrate a full network snapshot using AES-256-CBC + SHA256 integrity hashing. Maximum 3 snapshots. Use them wisely.

PHASE 03

SANITIZE

Execute the 5-step sanitize sequence under time pressure: wg-quick down → shred keys → flush iptables → clear history → delete logs.

PHASE 04

RESTORE

Recover from a burned node by restoring a previous snapshot. Forensic trace reduction applied. Network exposure decremented.

// COMMAND SEQUENCE PREVIEW — 36 COMMANDS ACROSS 7 PHASES
KEY_GEN
ssh-keygen
wg genkey
openssl genrsa
openssl req -x509
NODE_DEPLOY
ssh
apt-get install wireguard
wg genkey
openssl req
MESH_INIT
ip link add wg0
ip addr add
wg set wg0
ip link set up
FIREWALL
iptables -A FORWARD
iptables -t nat
iptables -P INPUT DROP
COMMS_VERIFY
openssl s_client
gpg --gen-key
gpg --encrypt
curl --cert
BACKUP
tar -czf
openssl enc -aes-256-cbc
sha256sum
scp -i
SANITIZE
wg-quick down
shred -vfz
iptables -F
history -c
// MISSION DOSSIER

Active Operations

Six starter missions across four threat levels. Each city brings unique network constraints and adversary behavior.

USA

Washington D.C.

THREAT: ALPHA

Tutorial. Full 36-command sequence. No time limit.

LANGLEY-1

GERMANY

Berlin

THREAT: ALPHA

Exfil 3 intelligence payloads via encrypted dead-drop network.

BERLIN-78:00

RUSSIA

Moscow

THREAT: BRAVO

Survive 2 consecutive RED TEAM sweep passes under live surveillance.

MOSCOW-1210:00

IRAN

Tehran

THREAT: BRAVO

Deploy dead-drop network across 3 city sectors. No misconfigurations.

TEHRAN-49:00

CHINA

Beijing

THREAT: CHARLIE

Operate under active HUMINT surveillance. Exfil 2 payloads undetected.

BEIJING-96:00

SOUTH KOREA

Seoul

THREAT: DELTA

Maximum threat environment. 4-node budget. Survive.

SEOUL-35:00
// ACCESS CONTROL

Request Clearance

GHOST CELL operates on an invitation-only basis. Submit your operator callsign and contact vector for vetting. Clearance decisions are final.

CLEARANCE LEVEL: UNCLEARED
CONTACT_VECTOR://

EYES ONLY · NO LOGS RETAINED · COMMS ENCRYPTED IN TRANSIT

HANDLE VIA GHOST CELL CHANNELS ONLY