<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[OffStrike]]></title><description><![CDATA[Offensive security research and exploit development.]]></description><link>https://offstrike.com/</link><image><url>https://offstrike.com/favicon.png</url><title>OffStrike</title><link>https://offstrike.com/</link></image><generator>Ghost 5.88</generator><lastBuildDate>Sun, 19 Apr 2026 08:56:59 GMT</lastBuildDate><atom:link href="https://offstrike.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Introducing Zeus]]></title><description><![CDATA[Zeus is OffStrike's post-exploitation framework built around temporal evasion and runtime compilation.]]></description><link>https://offstrike.com/introducing-zeus/</link><guid isPermaLink="false">69d30044633e3290b67c5336</guid><category><![CDATA[Rants]]></category><dc:creator><![CDATA[Franklin Roberts]]></dc:creator><pubDate>Mon, 06 Apr 2026 00:42:56 GMT</pubDate><media:content url="https://offstrike.com/content/images/2026/04/image.png" medium="image"/><content:encoded><![CDATA[<img src="https://offstrike.com/content/images/2026/04/image.png" alt="Introducing Zeus"><p>I&apos;ve been sitting on this for a while, and it&apos;s time to talk about it.</p><p>Zeus is OffStrike&apos;s post-exploitation framework, and it&apos;s built around a concept I&apos;ve been researching called temporal evasion &#x2014; executing operations during the microsecond windows when the EDR&apos;s threads are descheduled by the OS. If Defender isn&apos;t running when you act, it can&apos;t see what you did.</p><p>The idea is simple. EDR processes compete for CPU time like everything else. The OS scheduler preempts them constantly. By consuming CSwitch events via ETW, Zeus maps exactly when Defender&apos;s threads are on or off the processor and executes tasks in the gaps. In testing on Windows 11 with Defender fully enabled, we measured an average scheduling gap of 565&#xB5;s, executed nearly 4 million operations with a 100% success rate, and generated zero alerts. We also threw Meterpreter at it &#x2014; 1,623 payload attempts, zero detections.</p><p>Zeus pairs this scheduler awareness with two other components: an embedded Tiny C Compiler that compiles and runs tools from source strings entirely in memory (no binaries on disk, no MZ headers on the wire), and a compact Seq2Seq model that generates syntactically varied C code from intent tokens so nothing looks the same twice.</p><p>The C2 architecture itself had to be rethought. Traditional persistent shells don&apos;t work when you&apos;re executing in microsecond windows &#x2014; you can&apos;t hold a socket open. Zeus uses a task queue model instead. The agent pulls tasks on check-in, executes them during gaps, and sends results back later. It&apos;s less interactive than a traditional shell, but when stealth is the priority, that&apos;s the right trade.</p><p>The full research paper will be available soon. It covers the methodology, the empirical results, the limitations we hit (AMSI is immune, high-core-count systems narrow the gaps, managed code is a non-starter), and thoughts on how defenders can address the underlying vulnerability.</p><p>This isn&apos;t a finished product &#x2014; it&apos;s a research framework and a proof of concept. But the core finding holds, and I think it opens up an interesting conversation about what happens when offensive tradecraft starts treating the scheduler as an attack surface.</p><p>More to come.</p>]]></content:encoded></item><item><title><![CDATA[Introduction]]></title><description><![CDATA[<p>When I look at the people pushing the field forward and a huge chunk of them have never sat for a proctored exam. The researchers dropping zero-days, publishing novel evasion techniques, and building the tools everyone relies on often learned by doing, not by studying for a test. That&apos;</p>]]></description><link>https://offstrike.com/coming-soon/</link><guid isPermaLink="false">69d2c616633e3290b67c50fd</guid><category><![CDATA[Rants]]></category><dc:creator><![CDATA[Franklin Roberts]]></dc:creator><pubDate>Sun, 05 Apr 2026 20:29:10 GMT</pubDate><media:content url="https://static.ghost.org/v4.0.0/images/feature-image.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://static.ghost.org/v4.0.0/images/feature-image.jpg" alt="Introduction"><p>When I look at the people pushing the field forward and a huge chunk of them have never sat for a proctored exam. The researchers dropping zero-days, publishing novel evasion techniques, and building the tools everyone relies on often learned by doing, not by studying for a test. That&apos;s not a coincidence. Certifications are structured around known problems with known answers. The most interesting work in security happens in the space where neither exists yet.</p><p>That&apos;s not a knock on certs. I have plenty of them and they served a purpose &#x2014; they gave me structure early on, validated skills for employers who needed that checkbox, and forced me into corners of the field I might not have explored otherwise. But there&apos;s a ceiling to what you learn when the goal is passing an exam. You study the syllabus, not the rabbit hole. You optimize for the grade, not the question that keeps you up at night.</p><p>OffStrike exists because I needed a place to think without a rubric. It&apos;s where I get to chase the weird ideas &#x2014; temporal evasion, ML driven implants, tooling that doesn&apos;t fit neatly into any course outline. No learning objectives, no exam at the end, just the work itself. The best research I&apos;ve done didn&apos;t come from preparing for a certification. It came from tinkering with something that didn&apos;t make sense until it did. </p>]]></content:encoded></item></channel></rss>