Two Approaches to EDR Evasion: Kernel-Level BYOVD vs User-Space Injection

BYOVD kills your EDR. User-space injection makes it irrelevant. These two approaches to defeating endpoint detection operate at different privilege levels, target different layers, and require entirely different defensive strategies.

April 29, 2026 · JM00NJ

ICMP-Ghost v3.6.2: Fileless C2 with Dual-Channel Pivoting & DPI Evasion

Ghost-C2 v3.6.2 introduces Dual-Channel Protocol Pivoting via an in-memory VTable architecture — seamlessly switching between Raw ICMP and DNS UDP tunneling at runtime. Combined with PIC injection, VESQER compression, and layered evasion, it defeats Suricata v8.0.3. All in pure x64 Assembly.

April 25, 2026 · JM00NJ

Blinding AI Scanners with CMOV: Polymorphic CFG Breakers in Assembly

Static analysis tools like Ghidra and AI-driven EDRs rely on branching instructions to map malicious behavior. Discover how replacing JMPs with CMOV instructions creates a ‘Flat Graph’ illusion that completely blinds heuristic engines.

April 15, 2026 · JM00NJ

Evasion Techniques in Pure x64 Assembly: SROP and Zero-Copy Injection

Combining SROP with Syscall 311 provides a stealthy way to load shellcode. Learn how to hide syscalls and manipulate context while surviving the debugging hell of unnoticeable opcodes.

April 13, 2026 · JM00NJ

Introduction to Position Independent Code (PIC) Architecture

Break free from compiler constraints. Explore how to write Sectionless x64 Assembly, manipulate the stack for dynamic Read-Write (R-W) memory, and build reliable, position-independent foundations from scratch.

April 3, 2026 · JM00NJ