<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Offensive Security on Netacoding | Cybersecurity, Assembly &amp; Network Research</title>
    <link>https://netacoding.com/categories/offensive-security/</link>
    <description>Recent content in Offensive Security on Netacoding | Cybersecurity, Assembly &amp; Network Research</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 03 Apr 2026 17:20:50 +0300</lastBuildDate>
    <atom:link href="https://netacoding.com/categories/offensive-security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Introduction to Position Independent Code (PIC) Architecture</title>
      <link>https://netacoding.com/posts/pic-entry/</link>
      <pubDate>Fri, 03 Apr 2026 17:20:50 +0300</pubDate>
      <guid>https://netacoding.com/posts/pic-entry/</guid>
      <description>Discover the fundamentals of Position Independent Code (PIC) in x64 Assembly. Learn why it is essential for advanced payloads and how to implement the Stack Anchor technique for sectionless memory management.</description>
    </item>
    <item>
      <title>ICMP-Ghost v3.0: Advanced Stealth &amp; DPI Evasion in Pure x64 Assembly</title>
      <link>https://netacoding.com/posts/icmp-ghost/</link>
      <pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/icmp-ghost/</guid>
      <description>An in-depth analysis of Ghost-C2 v3.0.0. Mastering fileless execution, protocol mimicry, and rolling XOR obfuscation to defeat modern Suricata DPI and behavioral heuristics.</description>
    </item>
    <item>
      <title>Invisible Exfiltration: Advanced Evasion Techniques in Modern IDS/IPS Environments</title>
      <link>https://netacoding.com/posts/advanced-evasion-techniques/</link>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/advanced-evasion-techniques/</guid>
      <description>Master advanced network evasion. Explore RDTSC mimicry, smart ICMP fragmentation, and stateless port knocking to bypass modern IDS/IPS and EDR systems.</description>
    </item>
    <item>
      <title>Linux Process Evasion: ptrace &amp; prctl</title>
      <link>https://netacoding.com/posts/anti-analysis/</link>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/anti-analysis/</guid>
      <description>Master Linux process self-defense with x64 Assembly. Use ptrace for anti-debugging and prctl to block memory dumps against forensic analysis.</description>
    </item>
  </channel>
</rss>
