Giter VIP home page Giter VIP logo

ghost's Introduction

ghost


ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.

This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:

zombie.exe 127.0.0.1 27015

Bot Features

  • Remote command execution
  • Silent background process
  • Download and run file (Hidden)
  • Safe Mode startup
  • Will automatically connect to the server
  • Data sent and received is encrypted (substitution cipher)
  • Files are hidden
  • Installed Antivirus shown to server
  • Easily spread malware through download feature
  • Startup info doesn't show in msconfig or other startup checking programs like CCleaner
  • Disable Task Manager

When successfully started, it adds itself to the start-up pool and runs silently in the background. It will try to repeatedly connect to the server. This process does not hog any memory or CPU usage. This means that the zombie will silently just idle in the background and whenever the server is up, it will automatically connect.

When starting the server, it will prompt for you a listening port. This is the port that you need to use in the command-line for zombie.exe. Once you provide the port, your server information will be provided and the menu will be down. The IP address provided is your external IP. With that being said, unless the client/zombie is actively looking and tracking open connections, it will probably be smart to run this server under a remote location if you want to stay anonymous. If this does not interest you, simply renaming zombie.exe and/or changing the assembly information using a tool will likely fool the client/zombie.

Note: This project was only made for education purposes and to test out my recently published repositories (ahxrlogger & ahxrsocket). If you choose to use this for malicious reasons, you are completely responsible for the outcome.

ghost's People

Contributors

ahxr avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

ghost's Issues

new to malware

im new to malware can anyone contact me persoanlly and teach me the ins and outs on this malware and i shall put some money in your donation box and hopefully you expand your collections while i learn off of you . im trying to learn about gh0st in out , my issue is im a stranger to this occupancy.

Hey there

Hey, I am wondering what are the requirements for using such an amazing program as this I have a few old useless pcs I want to test with their own wifi network I stuffed into me I am curious what you need for it
Bye much love.

Cherri.

NOT WORKING NOW !

Hi bro. At this moment, ghost not working or only I have problem ? I typing via cmd "C:\...\zombie.exe 127.0.0.1 10284" and I getting after this notification from Windows like "zombie has connected" or something like that.. when I going to ghost.exe to check zombie, I click 1, or 3 to refresh, I getting this: "ERROR: There are no zombies connected.". What I doing wrong ? Or maybe it is outdated app ? Idk..

missing file

missing the mnifest file or do i not put it in extentions.

How to use

How to create server and how to create zombie.exe with correct port and IP?

Visual Studio

Hello,
How i can import this to Visual Studio or in wich IDE / Compiler i shoud use for it
I hope somebody can help me

-Beta

How to run this

Pretty simple question, how can I run and test this? whats the install / compile steps please

Help me pls im SUPER new onto this

How do i compile/execute? idk what to do once i download the zip... if you can tell me all the steps in order to have it ready to do things, thanks...

Runtimes not provided

the dlls that are needed to run this program is a debug version. does the owner have the intention to move this to a non debug release version of c++?

i got it running tho

Trouble Trying to build the project

Hello !
I want to use your project and possibly make an addition to it to present as a course project (improvements of existing malware are allowed), but I have had a hard time trying to build it, and would like to ask you what compiler should I use to effectively build it.
I have tried Eclipse win Cygwin and also CodeBlocks. In the first one I have several missing headers (one of them conio.h and I don't know where to get the right header from). In Codeblocks I made a good progress but still I have one missing header "stdafx.h" I downloaded one from the internet but I am unsure if that is correct. Some of the errors are shown in the images attached. Any help is really appreciated.

Thanks!
Img1

Img2

usage

pls kindly document how it can be used in kali linux

Gwet.exe

Es-que quand on double click sur gwet.exe dans le dossier on est infecter car mon pc a bpc plus de requet sur le réseaux et je trouve cela très louche

Help

Hello,

I am a web programmer and want to build your rat to control my server. But as a web programmer I don't know how to build your project. And looking at what it can do made me try a few things but without success. I really want to use your program so my question is:

How can I build your project? or how do I use it?

Thanks in advance!

Tim.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.