ICALIA
INFRASTRUCTURE AUDITING & ENGINEERING
WE
BUILD
AUDIT
PROTECT
BUILD
SYSTEMS
BUILD
AUDIT
PROTECT
BUILD
CAPABILITIES
01
Security Software
Red team and blue team tooling. We build custom security software for threat simulation, detection, and response operations.
02
Secure Networks
Design, build, and maintain secure network infrastructure for small businesses. Ongoing management and support included.
03
Security Operations
Penetration testing, vulnerability assessment, physical security evaluation. We identify weaknesses before attackers do.
ARSENAL
LOADERS & STAGERS
01
iCaLoader
Evasive shellcode loader that bypasses 95% of EDR solutions. Built for stealth-first operator deployment.
02
TUL
Totally Undetected Loader. Shellcode execution via stack spoofing & ALPC for clean call stacks and minimal forensic footprint.
03
PHANTOMJIT
Shellcode loader using JIT compiled delegates for execution. Dynamic code generation eliminates static signatures.
04
CICADA
Position independent Windows shellcode stager with sleep obfuscation and remote HTTPS staging. Minimal footprint, maximum flexibility.
PAYLOAD & PACKING
05
FRITTER
Complete rewrite of donut. 100% polymorphic output. 6-stage execution pipeline with sliding window decryption and full cleanup.
06
SSB
Custom manual PE mapping compression utility. UPX-style packing with manual mapping for reduced detection surface.
ACCESS & IMPLANTS
07
WAVEGATE
x64 Windows RMT with lateral movement, credential recovery, remote desktop, and advanced networking. Domain fronting, reverse proxy, AD enumeration, and more.
08
VZORVAT HVNC
100% novel HVNC with browser & system shell render support. Accepts any regular VNC client — no custom viewer required.
09
HOSTLESS
Implant that installs an isolated & persistent backdoor inside a small Hyper-V virtual machine with the Windows filesystem mounted to it.
CREDENTIAL RECOVERY
10
DETEGO
Credential recovery suite with built-in exfiltration. Evasive by design — never touches browser files directly.
11
2040
Custom RP2040 firmware for BadUSB credential recovery. Combines Fritter, iCaLoader, and Detego into a single hardware payload.
*Many details & features not listed. Contact us for more information.
Start a project with Icalia
Tell us about your security needs. We'll assess your current posture, identify risks, and build a protection plan that fits your business.