- ๐ป Stealth C2 Implant
This implant is a fully autonomous, stealth communication agent. It bundles a Tor client and payload into a single obfuscated binary. On execution, it extracts both, hides them in the system, sets up autorun persistence, and silently connects to a private Tor-based C2 server at every reboot. The implant encrypts traffic, avoids sandbox detection, and runs entirely in memory after launch, leaving little to no footprint.
- ๐งฉ Tor Hidden C2 Panel
A hardened command-and-control interface operating as a Tor hidden service. This panel features per-session token authentication with hashed access validation and logs each client interaction securely. It integrates encrypted implant management, stealth command dispatch, and persistent session tracking โ all hosted through a private .onion service to ensure operational security and full anonymity.
- ๐งช Malware Analysis Lab (Ongoing)
Setting up a secure, air-gapped environment for static and dynamic malware analysis. Focused on disassembling binaries using tools like Ghidra, reverse engineering PE files, and behavior tracking of real-world threats in controlled setups. Aims to deepen knowledge in AV evasion, loader construction, and post-exploitation tactics.
- ๐ธ RPi Camera Onion Stream
Built with Flask and Tor, this project streams live video securely over the dark web using a Raspberry Pi camera, enabling private surveillance and privacy-focused streaming infrastructure.
- ๐ฏ AliExpress Promo Bypass
Automates mass account generation and promo exploitation on AliExpress using Playwright. Integrates proxy rotation, CAPTCHA solving, SMS verification, and fake email systems while maintaining stealth through browser fingerprint spoofing.