ICMP Encapsulation: Bypassing DPI with Nested ICMP Type 3 Structures

Firewalls allow ICMP, but do they parse nested structures? Discover how to encapsulate protocols within ICMP Type 3 error messages to evaluate DPI resilience.

March 27, 2026 · JM00NJ

Invisible Exfiltration: Bypassing IDS/IPS with ICMP and RDTSC

True stealth is about blending into the noise. Discover how to use hardware-level timing, protocol mimicry, and jitter to make C2 traffic indistinguishable from legitimate activity.

March 27, 2026 · JM00NJ

Linux Process Evasion: ptrace & prctl

Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.

March 27, 2026 · JM00NJ

Solving IP Endianness in x64 Assembly: A Single-Pass Algorithm

Printing 192.168.1.5 instead of 5.1.168.192 is a common Assembly pitfall. Master a backward-build algorithm that handles Byte Order conversion without extra memory cycles.

March 27, 2026 · JM00NJ