๐Ÿ‘ป NullSec Stealth

February 27, 2026 ยท View on GitHub

๐Ÿ‘ป NullSec Stealth

Advanced Evasion & Anti-Forensics Toolkit

X/Twitter GitHub License

Crystal Lua D Haskell V

    โ–ˆโ–ˆโ–ˆโ–„    โ–ˆ  โ–ˆ    โ–ˆโ–ˆ  โ–ˆโ–ˆโ–“     โ–ˆโ–ˆโ–“      โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–“โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–„  
    โ–ˆโ–ˆ โ–€โ–ˆ   โ–ˆ  โ–ˆโ–ˆ  โ–“โ–ˆโ–ˆโ–’โ–“โ–ˆโ–ˆโ–’    โ–“โ–ˆโ–ˆโ–’    โ–’โ–ˆโ–ˆ    โ–’ โ–“โ–ˆ   โ–€ โ–’โ–ˆโ–ˆโ–€ โ–€โ–ˆ  
   โ–“โ–ˆโ–ˆ  โ–€โ–ˆ โ–ˆโ–ˆโ–’โ–“โ–ˆโ–ˆ  โ–’โ–ˆโ–ˆโ–‘โ–’โ–ˆโ–ˆโ–‘    โ–’โ–ˆโ–ˆโ–‘    โ–‘ โ–“โ–ˆโ–ˆโ–„   โ–’โ–ˆโ–ˆโ–ˆ   โ–’โ–“โ–ˆ    โ–„ 
   โ–“โ–ˆโ–ˆโ–’  โ–โ–Œโ–ˆโ–ˆโ–’โ–“โ–“โ–ˆ  โ–‘โ–ˆโ–ˆโ–‘โ–’โ–ˆโ–ˆโ–‘    โ–’โ–ˆโ–ˆโ–‘      โ–’   โ–ˆโ–ˆโ–’โ–’โ–“โ–ˆ  โ–„ โ–’โ–“โ–“โ–„ โ–„โ–ˆโ–ˆโ–’
   โ–’โ–ˆโ–ˆโ–‘   โ–“โ–ˆโ–ˆโ–‘โ–’โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–“ โ–‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’โ–‘โ–’โ–ˆโ–ˆโ–ˆโ–ˆโ–’โ–’ โ–“โ–ˆโ–ˆโ–ˆโ–€ โ–‘
   โ–‘ โ–’โ–‘   โ–’ โ–’ โ–‘โ–’โ–“โ–’ โ–’ โ–’ โ–‘ โ–’โ–‘โ–“  โ–‘โ–‘ โ–’โ–‘โ–“  โ–‘โ–’ โ–’โ–“โ–’ โ–’ โ–‘โ–‘โ–‘ โ–’โ–‘ โ–‘โ–‘ โ–‘โ–’ โ–’  โ–‘
     โ–‘    โ–‘    โ–‘   โ–‘   โ–‘         โ–‘            โ–‘   โ–‘   โ–‘        
   โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„โ–„
   โ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘ S T E A L T H โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–ˆ
   โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€โ–€
                       bad-antics

๐Ÿ”“ Join x.com/AnonAntics for premium features!


๐ŸŽฏ Features

ToolLanguageDescriptionFreePremium
stegohideCrystalAdvanced steganography encoderโœ…๐Ÿ”ฅ
procmaskLuaProcess name/memory maskingโœ…๐Ÿ”ฅ
timewarpDTimestamp manipulationโœ…๐Ÿ”ฅ
cryptchanHaskellEncrypted covert channelsโŒ๐Ÿ”ฅ
ghostmemVFileless memory executionโŒ๐Ÿ”ฅ
avbypassCrystalAV signature evasionโŒ๐Ÿ”ฅ

๐Ÿ“ Structure

nullsec-stealth/
โ”œโ”€โ”€ crystal/
โ”‚   โ””โ”€โ”€ stegohide.cr      # Steganography encoder/decoder
โ”œโ”€โ”€ lua/
โ”‚   โ””โ”€โ”€ procmask.lua      # Process masking utility
โ”œโ”€โ”€ dlang/
โ”‚   โ””โ”€โ”€ timewarp.d        # Timestamp manipulation
โ”œโ”€โ”€ haskell/
โ”‚   โ””โ”€โ”€ cryptchan.hs      # Encrypted covert channels
โ””โ”€โ”€ vlang/
    โ””โ”€โ”€ ghostmem.v        # Fileless memory execution

๐Ÿ”ง Installation

Crystal - StegoHide

cd crystal
crystal build stegohide.cr --release -o stegohide
./stegohide encode -i secret.txt -c cover.png -o output.png

Lua - ProcMask

cd lua
lua procmask.lua --pid 1234 --name "systemd"

D - TimeWarp

cd dlang
dmd -release -O timewarp.d -of=timewarp
./timewarp --file target.exe --time "2020-01-01 00:00:00"

Haskell - CryptChan

cd haskell
ghc -O2 cryptchan.hs -o cryptchan
./cryptchan --mode server --port 443 --key mykey

V - GhostMem

cd vlang
v -prod ghostmem.v -o ghostmem
./ghostmem --payload shellcode.bin --target pid

๐Ÿ’€ Tool Details

StegoHide (Crystal)

Advanced steganography tool supporting multiple carrier formats:

  • PNG/BMP - LSB encoding with encryption
  • JPEG - DCT coefficient manipulation
  • WAV/MP3 - Audio spectrum hiding
  • PDF - Whitespace encoding
  • AES-256 encryption for payloads

ProcMask (Lua)

Process evasion and masking utility:

  • Rename running process in memory
  • Mask command line arguments
  • Hollow process injection setup
  • Parent PID spoofing preparation
  • Module list manipulation

TimeWarp (D)

Timestamp manipulation for anti-forensics:

  • Modify MACB timestamps (Modified, Accessed, Changed, Birth)
  • Recursive directory timestamp matching
  • Random timestamp within range
  • Clone timestamps from reference file
  • NTFS STANDARDINFOandSTANDARD_INFO and FILE_NAME manipulation

CryptChan (Haskell)

Encrypted covert communication channels:

  • DNS tunneling with encryption
  • ICMP covert channel
  • HTTP header smuggling
  • TLS certificate field hiding
  • Timing-based channels

GhostMem (V)

Fileless payload execution:

  • Direct syscall execution
  • Memory-only payload loading
  • Process hollowing
  • Module stomping
  • Thread execution hijacking

FOR EDUCATIONAL AND AUTHORIZED SECURITY TESTING ONLY

These tools are designed for:

  • Red team engagements
  • Penetration testing
  • Security research
  • Educational purposes

Unauthorized use against systems you don't own or have permission to test is illegal.


๐Ÿ“œ License

NullSec Proprietary License - See LICENSE for details.

Premium features require a valid key from x.com/AnonAntics


Twitter โ€ข GitHub โ€ข Tools

Made with ๐Ÿ’€ by bad-antics