This is a C2 that uses various techniques to evade from eBPF based security monitoring.
- Userland exec / reflective ELF loading.
- Event spamming / resource exhaustion.
- Sockets and TCP connection using io_uring.
- Map tampering (TODO).
ulexec [command]
memfd [command]
noise [on/off]