Linux Process Evasion: ptrace & prctl
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.
A ‘ping’ is not just a ping. Every OS leaves a unique ICMP fingerprint. Discover how to use Traffic Mimicry and x64 Assembly to blend custom packets into ambient network noise.
Consistency is key in high-speed data. Beyond simple latency, jitter reveals the true health of a network. Discover how to bypass OS clock noise using RDTSC for nanosecond-scale precision.
Traditional disk storage leaves traces. memfd_create enables anonymous, volatile files that reside exclusively in RAM. Learn to implement this in x64 Assembly for low-footprint operations.
Go behind the scenes of the Linux Kernel. Learn the register protocol for syscalls and why the .bss segment is essential for efficient, zero-disk memory reservation.
Meet the ghost in the machine. ICMP-Ghost uses zero-dependency x64 Assembly to bypass EDRs. Learn how fileless execution and ICMP stealth communication work at the syscall level.
A malformed packet is a dead packet. Learn how to implement the official RFC 1071 checksum algorithm in Assembly to ensure your custom ICMP data bypasses kernel drops.
Printing 192.168.1.5 instead of 5.1.168.192 is a common Assembly pitfall. Master a backward-build algorithm that handles Byte Order conversion without extra memory cycles.
Scapy or C are easy, but true control lies in the CPU cycles. Learn how to build a raw socket sniffer from scratch in x64 Assembly, bypassing libc for pure kernel interaction.
Firewalls allow ICMP, but do they parse nested structures? Discover how to encapsulate protocols within ICMP Type 3 error messages to evaluate DPI resilience.