+========= PROGRAM CATALOG =========+
| 50 programs · 5 types · 4 tiers |
+===================================+
ATTACK · 30
DEFENSE · 20
·
◆ MYTHIC 5
◆ EPIC 10
◆ RARE 15
◆ COMMON 20
// ATTACK
◆ MYTHIC
ATK
ROOTKIT_R7
Lives below ring zero and pays no rent.
◆ EPIC
ATK
BUFFER_SLAM
Pushes data past the fence and into the next process's lap.
◆ RARE
ATK
HEAP_OVERFLOW
Spills memory until the kernel forgets where it lives.
◆ RARE
ATK
RACE_COND
Two threads, one resource, zero sportsmanship.
◆ COMMON
ATK
NULL_DEREF
Hands a process a pointer to nothing and watches it follow.
◆ COMMON
ATK
STACK_SMASH
Overwrites the return address with somewhere more interesting.
// DEFENSE
◆ EPIC
DEF
STACK_GUARD
A canary in the frame. It sings before it dies.
◆ RARE
DEF
ASLR_PATCH
Shuffles every address until the exploit forgets where to land.
◆ COMMON
DEF
KMOD_LOCK
Signed modules only. The kernel is not taking guests.
◆ COMMON
DEF
SYSCALL_FILT
A whitelist for what a process is allowed to want.
// ATTACK
◆ MYTHIC
ATK
BGP_LEAK
Announces routes you do not own to autonomous systems that believe you.
◆ EPIC
ATK
SYN_STORM
Half-open handshakes until the table can't hold them.
◆ RARE
ATK
ARP_SPOOF
Convinces the network you are the gateway.
◆ RARE
ATK
DNS_HIJACK
Resolves their requests to your basement.
◆ COMMON
ATK
PACKET_RIP
Tears headers open and reads what was meant for someone else.
◆ COMMON
ATK
TCP_FLOOD
Open every connection. Close none. Watch the queue weep.
// DEFENSE
◆ EPIC
DEF
ICE_WALL
Intrusion Countermeasures, Electrified. Old name. Still works.
◆ RARE
DEF
PACKET_GATE
Reads every header. Trusts none of them.
◆ COMMON
DEF
DEEP_INSPECT
The payload has nowhere to hide; the inspector reads it all.
◆ COMMON
DEF
PORT_CLOAK
Knocks required. The scanner sees only closed doors.
// ATTACK
◆ MYTHIC
ATK
KEY_FORGE
Manufactures a private key from a public mistake.
◆ EPIC
ATK
MITM
Sits politely between two parties. Listens. Edits.
◆ RARE
ATK
HASH_COLLIDE
Two inputs, one digest, no integrity.
◆ RARE
ATK
RAINBOW_HIT
A precomputed table walks into a password file.
◆ COMMON
ATK
PADDING_BLEED
The error message tells you which byte you got wrong.
◆ COMMON
ATK
TIMING_LEAK
The clock tells you everything the cipher refuses to.
// DEFENSE
◆ EPIC
DEF
CIPHER_LATTICE
Post-quantum. The math is hard now and harder later.
◆ RARE
DEF
KEY_VAULT
Hardware-backed. The keys never leave the silicon.
◆ COMMON
DEF
ENTROPY_POOL
Genuine randomness, sourced from places you do not want to know.
◆ COMMON
DEF
TLS_FORTRESS
A ciphersuite list with no weak entries and no patience.
// ATTACK
◆ MYTHIC
ATK
COBALT_ECHO
A beacon dressed as a normal employee email.
◆ EPIC
ATK
PHISH_NET
A login page so familiar nobody reads the URL.
◆ RARE
ATK
JACKSUIT
Wears another operator's credentials like a borrowed jacket.
◆ RARE
ATK
PRETEXT_X
You are the new vendor. They have your invoice.
◆ COMMON
ATK
BAITWARE
Free, irresistible, and signed by nobody.
◆ COMMON
ATK
WETWARE
The exploit lives between the chair and the screen.
// DEFENSE
◆ EPIC
DEF
SANDBOX_X
Every untrusted process plays in its own padded room.
◆ RARE
DEF
INTENT_FILTER
Reads the email twice and the sender's history once.
◆ COMMON
DEF
CONSTRUCT
A simulated environment for inputs that haven't earned trust.
◆ COMMON
DEF
SIG_VERIFY
Unsigned binaries do not run here. No exceptions, no excuses.
// ATTACK
◆ MYTHIC
ATK
ROWHAMMER
Hits one DRAM row hard enough to flip the next.
◆ EPIC
ATK
EMP_PULSE
A single coil unmakes a season of patches.
◆ RARE
ATK
BUS_PIRATE
Clamps onto the bus and asks polite questions in raw voltage.
◆ RARE
ATK
JTAG_DRAIN
Pulls firmware out the debug port like a confession.
◆ COMMON
ATK
CHIP_PEEL
Decapsulate the die. Photograph the secrets.
◆ COMMON
ATK
FIRMWARE_X
Replaces the BIOS with one that loves you.
// DEFENSE
◆ EPIC
DEF
TPM_LOCK
Boot only what was measured. Refuse the rest.
◆ RARE
DEF
CHROME_SHELL
Tamper-evident enclosure. Open it and the keys self-erase.
◆ COMMON
DEF
BIOS_SEAL
The firmware is signed, sealed, and not interested in updates.
◆ COMMON
DEF
POWER_DAMP
Smooths the rail until the side-channel falls silent.