jm00nj@localhost:~$ cat /var/log/identity
I am a low-level systems researcher and malware developer focusing on offensive security, operating strictly below the API layer. My research dissects modern detection mechanisms (EDR/NDR) and builds unhooked, zero-dependency solutions in pure x86-64 Assembly.
- 🔭 Currently Researching: In-memory PIC injection, DPCM-RLE hybrid compression, and Falco/Suricata evasion.
- ⚙️ Weapon of Choice: Pure x64 Assembly (Libc-free).
- 🧠 Philosophy: "If it touches the disk, it's already dead."
- ICMP-Ghost: A fileless, libc-free x64 Assembly C2 agent utilizing DPCM-RLE hybrid compression and rolling XOR for deep DPI evasion.
- Phantom Loader: hantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). It leverages advanced techniques such as SROP and Zero-Copy Injection to deliver payloads as a ghost in the machine
- Vesqer-Baremetal-Compressor: A standalone DPCM-RLE hybrid compression engine built for strict memory constraints.
