Two Approaches to EDR Evasion: Kernel-Level BYOVD vs User-Space Injection

BYOVD kills your EDR. User-space injection makes it irrelevant. These two approaches to defeating endpoint detection operate at different privilege levels, target different layers, and require entirely different defensive strategies.

April 29, 2026 · JM00NJ

ICMP-Ghost v3.6.2: Fileless C2 with Dual-Channel Pivoting & DPI Evasion

Ghost-C2 v3.6.2 introduces Dual-Channel Protocol Pivoting via an in-memory VTable architecture — seamlessly switching between Raw ICMP and DNS UDP tunneling at runtime. Combined with PIC injection, VESQER compression, and layered evasion, it defeats Suricata v8.0.3. All in pure x64 Assembly.

April 25, 2026 · JM00NJ

Pure Assembly vs C/Rust: Why Language Choice Matters for Malware Evasion

Most people assume the language doesn’t matter — only behavior does. This post breaks down exactly why that assumption is wrong, with empirical evidence and real-world test results.

April 25, 2026 · JM00NJ

Dissecting LockBit 5.0 Linux: A Deep Dive into Offline-Capable Ransomware

LockBit 5.0 Linux encrypts files with zero network activity, uses ChaCha20 with Curve25519 key exchanges, and actively evades strace-based monitoring. This post documents the full analysis pipeline: eBPF tracing, static RE with Ghidra, and triple-confirmed network behavior analysis.

April 23, 2026 · JM00NJ

AI Firewalls Are a Lie: Why Real Security Lives at the Kernel Level

A technical analysis of why deterministic security problems cannot be solved with probabilistic AI solutions, and why container/RBAC approaches provide stronger guarantees.

April 21, 2026 · JM00NJ