Two Approaches to EDR Evasion: Kernel-Level BYOVD vs User-Space Injection

BYOVD kills your EDR. User-space injection makes it irrelevant. These two approaches to defeating endpoint detection operate at different privilege levels, target different layers, and require entirely different defensive strategies.

April 29, 2026 · JM00NJ

ICMP-Ghost v3.6.2: Fileless C2 with Dual-Channel Pivoting & DPI Evasion

Ghost-C2 v3.6.2 introduces Dual-Channel Protocol Pivoting via an in-memory VTable architecture — seamlessly switching between Raw ICMP and DNS UDP tunneling at runtime. Combined with PIC injection, VESQER compression, and layered evasion, it defeats Suricata v8.0.3. All in pure x64 Assembly.

April 25, 2026 · JM00NJ

Pure Assembly vs C/Rust: Why Language Choice Matters for Malware Evasion

Most people assume the language doesn’t matter — only behavior does. This post breaks down exactly why that assumption is wrong, with empirical evidence and real-world test results.

April 25, 2026 · JM00NJ

Blinding AI Scanners with CMOV: Polymorphic CFG Breakers in Assembly

Static analysis tools like Ghidra and AI-driven EDRs rely on branching instructions to map malicious behavior. Discover how replacing JMPs with CMOV instructions creates a ‘Flat Graph’ illusion that completely blinds heuristic engines.

April 15, 2026 · JM00NJ

Evasion Techniques in Pure x64 Assembly: SROP and Zero-Copy Injection

Combining SROP with Syscall 311 provides a stealthy way to load shellcode. Learn how to hide syscalls and manipulate context while surviving the debugging hell of unnoticeable opcodes.

April 13, 2026 · JM00NJ