Linux Process Evasion: ptrace & prctl
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
A ‘ping’ is not just a ping. Every OS leaves a unique ICMP fingerprint. Discover how to use Traffic Mimicry and x64 Assembly to blend custom packets into ambient network noise.
Consistency is key in high-speed data. Beyond simple latency, jitter reveals the true health of a network. Discover how to bypass OS clock noise using RDTSC for nanosecond-scale precision.
Traditional disk storage leaves traces. memfd_create enables anonymous, volatile files that reside exclusively in RAM. Learn to implement this in x64 Assembly for low-footprint operations.
Traditional kernel modules are risky. eBPF provides a safe, high-speed ‘superpower’ for the Linux Kernel. Learn how XDP and kprobes revolutionize networking and tracing.
True stealth is about blending into the noise. Discover how to use hardware-level timing, protocol mimicry, and jitter to make C2 traffic indistinguishable from legitimate activity.
Go behind the scenes of the Linux Kernel. Learn the register protocol for syscalls and why the .bss segment is essential for efficient, zero-disk memory reservation.
Meet the ghost in the machine. ICMP-Ghost uses zero-dependency x64 Assembly to bypass EDRs. Learn how fileless execution and ICMP stealth communication work at the syscall level.
A malformed packet is a dead packet. Learn how to implement the official RFC 1071 checksum algorithm in Assembly to ensure your custom ICMP data bypasses kernel drops.
Printing 192.168.1.5 instead of 5.1.168.192 is a common Assembly pitfall. Master a backward-build algorithm that handles Byte Order conversion without extra memory cycles.