This is a C2 that uses various techniques to evade from eBPF based security monitoring.
- Userland exec / reflective ELF loading.
- Event spamming / resource exhaustion.
- Sockets and TCP connection using io_uring.
- Map tampering (TODO).
ulexec [command]memfd [command]noise [on/off]