<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: weilong</title>
    <description>The latest articles on Forem by weilong (@xingkong0508).</description>
    <link>https://forem.com/xingkong0508</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3808454%2F75f79051-d479-4d87-8ce9-5920167e29d5.png</url>
      <title>Forem: weilong</title>
      <link>https://forem.com/xingkong0508</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/xingkong0508"/>
    <language>en</language>
    <item>
      <title>Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)</title>
      <dc:creator>weilong</dc:creator>
      <pubDate>Fri, 06 Mar 2026 05:31:15 +0000</pubDate>
      <link>https://forem.com/xingkong0508/stress-test-my-digital-fortress-an-ebpf-shannon-entropy-guard-open-sourced-1m5e</link>
      <guid>https://forem.com/xingkong0508/stress-test-my-digital-fortress-an-ebpf-shannon-entropy-guard-open-sourced-1m5e</guid>
      <description>&lt;p&gt;I’ve built a "Digital Guillotine" in the Linux kernel, and I want you to help me break it.&lt;br&gt;
​I have combined eBPF (XDP) with multidimensional Shannon Entropy analysis to create Realm 2.5—a security application that doesn't just block IPs; it judges the "chaos" of the traffic itself.&lt;br&gt;
​🛠️ The Architecture: Intelligence at the Edge&lt;br&gt;
​Unlike traditional firewalls, Realm operates at the XDP (Express Data Path) layer. It evaluates every payload before it even touches the socket buffer.&lt;br&gt;
​Entropy Auditing: It calculates the randomness (H) of incoming data. If your payload is too "chaotic" (obfuscated or encrypted attack strings), the kernel executes an instant ban.&lt;br&gt;
​L3 Honeypots: I’ve integrated traps on ports 2375, 2222, and 6379. One wrong move, and you are marked in the eBPF map.&lt;br&gt;
​👁️ The Tactical Command Center (Live)&lt;br&gt;
​You can visit the dashboard as a "Normal User" right now. You will see the Total Threat Archive—a real-time list of IPs that have already been "beheaded" by the system.&lt;br&gt;
​🌐 Live Dashboard: &lt;a href="http://35.212.157.202/" rel="noopener noreferrer"&gt;http://35.212.157.202/&lt;/a&gt;&lt;br&gt;
​🛠️ GitHub Repository: xingkong0508/realm&lt;br&gt;
​⚔️ The Challenge: Give Me Pressure&lt;br&gt;
​If you attempt to breach my "Realm," your IP will be added to the Blacklist immediately.&lt;br&gt;
​The Sentence: Bans are enforced at the kernel level.&lt;br&gt;
​The Mercy: I’ve set an auto-unban timer of 10 minutes. After 600 seconds, the eBPF map will clear your entry, and you can try again.&lt;br&gt;
​I am asking for your help. Give my server some pressure. Let’s see if my entropy logic holds up against professional-grade obfuscation.&lt;br&gt;
​🚀 The Future: Lowering the Shield for All&lt;br&gt;
​This project is already Open Source. However, I plan to lower the "entry bar" for this framework soon. I want to refine the code so that any developer—not just kernel experts—can deploy these advanced shields with a single command.&lt;br&gt;
​Let’s complete this masterpiece together. Do your worst, and let the logs tell the story.&lt;/p&gt;

</description>
      <category>security</category>
      <category>ebpf</category>
      <category>showdev</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel</title>
      <dc:creator>weilong</dc:creator>
      <pubDate>Fri, 06 Mar 2026 05:18:03 +0000</pubDate>
      <link>https://forem.com/xingkong0508/your-obfuscation-is-just-math-to-me-an-ebpf-guillotine-in-the-linux-kernel-4fob</link>
      <guid>https://forem.com/xingkong0508/your-obfuscation-is-just-math-to-me-an-ebpf-guillotine-in-the-linux-kernel-4fob</guid>
      <description>&lt;h1&gt;
  
  
  Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;The Era of Signature-Based Defense is Dead.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Stop relying on outdated blacklists. I built &lt;strong&gt;Realm 2.5&lt;/strong&gt;, an eBPF-powered fortress that doesn't care about your "clever" payloads.&lt;/p&gt;

&lt;h2&gt;
  
  
  🛡️ The Mechanism: Mathematical Sentencing
&lt;/h2&gt;

&lt;p&gt;Most firewalls wait for the CPU to process the packet. &lt;strong&gt;Realm&lt;/strong&gt; acts at the &lt;strong&gt;XDP (Express Data Path)&lt;/strong&gt; layer, the absolute frontline of the Linux kernel. Before your packet even breathes the air of the userspace, it meets the &lt;strong&gt;Entropy Judge&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;I calculate the &lt;strong&gt;Shannon Entropy (H)&lt;/strong&gt; of every single payload in real-time using the formula:&lt;br&gt;
&lt;strong&gt;H = -Σ P(x_i) log2 P(x_i)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If your chaos exceeds &lt;strong&gt;4.2&lt;/strong&gt;, my kernel probe assumes you are hiding something—obfuscation, shellcode, or randomized junk. The verdict? &lt;strong&gt;Instant Decapitation.&lt;/strong&gt; Your IP is dropped by the XDP driver before it can even finish the handshake.&lt;/p&gt;

&lt;h2&gt;
  
  
  🕸️ The Labyrinths (Honeypots)
&lt;/h2&gt;

&lt;p&gt;I have left "doors" open for the greedy. If you touch my &lt;strong&gt;2375 (Docker)&lt;/strong&gt;, &lt;strong&gt;2222 (SSH)&lt;/strong&gt;, or &lt;strong&gt;6379 (Redis)&lt;/strong&gt; ports, you aren't just logged—you are marked. The eBPF maps will remember your "sin" and silence you across the entire network.&lt;/p&gt;

&lt;h2&gt;
  
  
  👁️ The Execution Archive
&lt;/h2&gt;

&lt;p&gt;My dashboard isn't a UI; it's a graveyard. Every failed attempt, every "clever" script, is archived here for the world to see in a high-contrast Cyberpunk aesthetic.&lt;/p&gt;

&lt;h2&gt;
  
  
  ⚔️ The Ultimatum
&lt;/h2&gt;

&lt;p&gt;I’ve deployed this on a &lt;strong&gt;GCP instance&lt;/strong&gt;. I know there are wizards out there who think they can bypass the laws of entropy. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Live Target:&lt;/strong&gt; &lt;a href="http://35.212.157.202/" rel="noopener noreferrer"&gt;http://35.212.157.202/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Source:&lt;/strong&gt; &lt;a href="https://github.com/xingkong0508/realm" rel="noopener noreferrer"&gt;https://github.com/xingkong0508/realm&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;I am ready for this Realm to fall. I have analyzed every line of my Go and C code, and I am prepared for the inevitable breach.&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;But until you prove me wrong, I remain the master of this kernel space. Fearless. Unyielding.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do your worst. I’m waiting in the logs.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flelaxycfihe9esootgag.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flelaxycfihe9esootgag.jpg" alt=" " width="800" height="1194"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ebpf</category>
      <category>go</category>
      <category>showdev</category>
    </item>
    <item>
      <title>I built an eBPF-powered "Judge" that executes packets based on Shannon Entropy. Break my Realm.</title>
      <dc:creator>weilong</dc:creator>
      <pubDate>Thu, 05 Mar 2026 18:04:44 +0000</pubDate>
      <link>https://forem.com/xingkong0508/i-built-an-ebpf-powered-judge-that-executes-packets-based-on-shannon-entropy-break-my-realm-3co</link>
      <guid>https://forem.com/xingkong0508/i-built-an-ebpf-powered-judge-that-executes-packets-based-on-shannon-entropy-break-my-realm-3co</guid>
      <description>&lt;p&gt;The Core Philosophy: Beyond Signatures&lt;br&gt;
​Most firewalls are librarians; they check books against a list of banned titles. I wanted a Judge. I built Realm 2.5, an active defense engine that runs in the kernel and judges the "chaos" of incoming payloads.&lt;br&gt;
​The Tech Stack&lt;br&gt;
​L3 Execution via XDP: By leveraging eBPF (XDP), Realm processes and drops malicious packets at the network driver level. It doesn't wait for the Linux stack to wake up; it acts on arrival.&lt;br&gt;
​The Entropy Sentencing: I use Shannon Entropy to analyze the randomness of every payload. If the entropy H exceeds 4.2, the payload is deemed "maliciously obfuscated," and the source IP is instantly beheaded (banned) in the eBPF maps.&lt;br&gt;
​Honeypot Labyrinths: I've left active baits on ports 2375 (Docker), 2222 (SSH), and 6379 (Redis). One touch, and you're out.&lt;br&gt;
​The Cyberpunk Dashboard&lt;br&gt;
​The backend isn't just a log; it's an archive of failed attempts. You can see the live "executions" on my dashboard, designed with a heavy cyberpunk aesthetic to remind attackers of the digital wall they just hit.&lt;br&gt;
​The Challenge&lt;br&gt;
​I am a student of the kernel, and I know that no wall is infinite. I've deployed this on a GCP instance. I invite you—the wizards and the curious—to test its limits. Can you bypass the entropy filter?&lt;br&gt;
​🌐 Live Target: &lt;a href="http://35.212.157.202/" rel="noopener noreferrer"&gt;http://35.212.157.202/&lt;/a&gt;&lt;br&gt;
​🛠️ Source Code: xingkong0508/realm&lt;br&gt;
​A Final Word&lt;br&gt;
​I am fully prepared for the moment this fortress is breached. In the world of security, perfection is an illusion. But until that moment of total compromise arrives, I remain fearless. If you break it, I will learn, I will adapt, and I will be back with something stronger. Do your worst.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupra9mldiuzaj3xxdjmd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupra9mldiuzaj3xxdjmd.jpg" alt=" " width="800" height="1194"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ebpf</category>
      <category>go</category>
    </item>
  </channel>
</rss>
