Two Approaches to EDR Evasion: Kernel-Level BYOVD vs User-Space Injection

BYOVD kills your EDR. User-space injection makes it irrelevant. These two approaches to defeating endpoint detection operate at different privilege levels, target different layers, and require entirely different defensive strategies.

April 29, 2026 · JM00NJ

ICMP-Ghost v3.6.2: Fileless C2 with Dual-Channel Pivoting & DPI Evasion

Ghost-C2 v3.6.2 introduces Dual-Channel Protocol Pivoting via an in-memory VTable architecture — seamlessly switching between Raw ICMP and DNS UDP tunneling at runtime. Combined with PIC injection, VESQER compression, and layered evasion, it defeats Suricata v8.0.3. All in pure x64 Assembly.

April 25, 2026 · JM00NJ

Pure Assembly vs C/Rust: Why Language Choice Matters for Malware Evasion

Most people assume the language doesn’t matter — only behavior does. This post breaks down exactly why that assumption is wrong, with empirical evidence and real-world test results.

April 25, 2026 · JM00NJ

Invisible Exfiltration: Bypassing IDS/IPS with ICMP and RDTSC

True stealth is about blending into the noise. Discover how to use hardware-level timing, protocol mimicry, and jitter to make C2 traffic indistinguishable from legitimate activity.

March 27, 2026 · JM00NJ