Two Approaches to EDR Evasion: Kernel-Level BYOVD vs User-Space Injection

BYOVD kills your EDR. User-space injection makes it irrelevant. These two approaches to defeating endpoint detection operate at different privilege levels, target different layers, and require entirely different defensive strategies.

April 29, 2026 · JM00NJ

ICMP-Ghost v3.6.2: Fileless C2 with Dual-Channel Pivoting & DPI Evasion

Ghost-C2 v3.6.2 introduces Dual-Channel Protocol Pivoting via an in-memory VTable architecture — seamlessly switching between Raw ICMP and DNS UDP tunneling at runtime. Combined with PIC injection, VESQER compression, and layered evasion, it defeats Suricata v8.0.3. All in pure x64 Assembly.

April 25, 2026 · JM00NJ

Pure Assembly vs C/Rust: Why Language Choice Matters for Malware Evasion

Most people assume the language doesn’t matter — only behavior does. This post breaks down exactly why that assumption is wrong, with empirical evidence and real-world test results.

April 25, 2026 · JM00NJ

Timed Noise: LCG-Based Jitter in x64 Assembly

Fixed-interval sleeps make system behavior predictable. Break that pattern with LCG-based jitter — combine rdtsc entropy with LCG scrambling and deliver randomized delays via nanosleep.

April 20, 2026 · JM00NJ

Evasion Techniques in Pure x64 Assembly: SROP and Zero-Copy Injection

Combining SROP with Syscall 311 provides a stealthy way to load shellcode. Learn how to hide syscalls and manipulate context while surviving the debugging hell of unnoticeable opcodes.

April 13, 2026 · JM00NJ