GHOST
CELL
Operational Feature Set
Built for those who understand that realistic tradecraft simulation requires uncompromising technical authenticity.
36-Command Sequence
Execute a real-world covert infrastructure deployment sequence: WireGuard mesh networking, TLS certificate chains, iptables hardening, encrypted backup exfiltration, and forensic sanitization. Every command matters.
wg genkey / wg setopenssl x509 / reqiptables -P INPUT DROPshred -vfz -n 3Live RED TEAM AI
A persistent adversarial sweep engine hunts your network in real time. Sweep zones advance across the map, suspicion accumulates, nodes get burned. One mistake and attribution is imminent.
Dynamic sweep zonesSIGINT correlation attacksHUMINT threat triggersAttribution cascadeReal Network Protocols
No abstractions. Every protocol is simulated with technical fidelity: WireGuard VPN tunnels, mTLS mutual authentication, GPG payload encryption, SCP exfiltration with key-based auth.
WireGuard mesh tunnelsmTLS handshake verificationGPG payload encryptionSSH session managementHow It Works
Four operational phases. Each requires precise execution. Failure in any phase cascades to attribution.
DEPLOY
Place ENTRY, RELAY, DEAD_DROP, BRIDGE, and EXIT nodes on the city map. Build your covert infrastructure topology before the timer starts.
BACKUP
Encrypt and exfiltrate a full network snapshot using AES-256-CBC + SHA256 integrity hashing. Maximum 3 snapshots. Use them wisely.
SANITIZE
Execute the 5-step sanitize sequence under time pressure: wg-quick down → shred keys → flush iptables → clear history → delete logs.
RESTORE
Recover from a burned node by restoring a previous snapshot. Forensic trace reduction applied. Network exposure decremented.
ssh-keygenwg genkeyopenssl genrsaopenssl req -x509sshapt-get install wireguardwg genkeyopenssl reqip link add wg0ip addr addwg set wg0ip link set upiptables -A FORWARDiptables -t natiptables -P INPUT DROPopenssl s_clientgpg --gen-keygpg --encryptcurl --certtar -czfopenssl enc -aes-256-cbcsha256sumscp -iwg-quick downshred -vfziptables -Fhistory -cActive Operations
Six starter missions across four threat levels. Each city brings unique network constraints and adversary behavior.
USA
Washington D.C.
Tutorial. Full 36-command sequence. No time limit.
GERMANY
Berlin
Exfil 3 intelligence payloads via encrypted dead-drop network.
RUSSIA
Moscow
Survive 2 consecutive RED TEAM sweep passes under live surveillance.
IRAN
Tehran
Deploy dead-drop network across 3 city sectors. No misconfigurations.
CHINA
Beijing
Operate under active HUMINT surveillance. Exfil 2 payloads undetected.
SOUTH KOREA
Seoul
Maximum threat environment. 4-node budget. Survive.
Request Clearance
GHOST CELL operates on an invitation-only basis. Submit your operator callsign and contact vector for vetting. Clearance decisions are final.