INFRASTRUCTURE AUDITING & ENGINEERING

WE
BUILD AUDIT PROTECT BUILD

SYSTEMS

CAPABILITIES

01

Security Software

Red team and blue team tooling. We build custom security software for threat simulation, detection, and response operations.

02

Secure Networks

Design, build, and maintain secure network infrastructure for small businesses. Ongoing management and support included.

03

Security Operations

Penetration testing, vulnerability assessment, physical security evaluation. We identify weaknesses before attackers do.

ARSENAL

LOADERS & STAGERS

01
iCaLoader
Evasive shellcode loader that bypasses 95% of EDR solutions. Built for stealth-first operator deployment.
02
TUL
Totally Undetected Loader. Shellcode execution via stack spoofing & ALPC for clean call stacks and minimal forensic footprint.
03
PHANTOMJIT
Shellcode loader using JIT compiled delegates for execution. Dynamic code generation eliminates static signatures.
04
CICADA
Position independent Windows shellcode stager with sleep obfuscation and remote HTTPS staging. Minimal footprint, maximum flexibility.

PAYLOAD & PACKING

05
FRITTER
Complete rewrite of donut. 100% polymorphic output. 6-stage execution pipeline with sliding window decryption and full cleanup.
06
SSB
Custom manual PE mapping compression utility. UPX-style packing with manual mapping for reduced detection surface.

ACCESS & IMPLANTS

07
WAVEGATE
x64 Windows RMT with lateral movement, credential recovery, remote desktop, and advanced networking. Domain fronting, reverse proxy, AD enumeration, and more.
08
VZORVAT HVNC
100% novel HVNC with browser & system shell render support. Accepts any regular VNC client — no custom viewer required.
09
HOSTLESS
Implant that installs an isolated & persistent backdoor inside a small Hyper-V virtual machine with the Windows filesystem mounted to it.

CREDENTIAL RECOVERY

10
DETEGO
Credential recovery suite with built-in exfiltration. Evasive by design — never touches browser files directly.
11
2040
Custom RP2040 firmware for BadUSB credential recovery. Combines Fritter, iCaLoader, and Detego into a single hardware payload.

*Many details & features not listed. Contact us for more information.

Start a project with Icalia

Tell us about your security needs. We'll assess your current posture, identify risks, and build a protection plan that fits your business.

Start a project