DEV Community

Cover image for Show HN: Dead Dialect — Malware speaks dead language, cannot execute in session
curtis
curtis

Posted on

Show HN: Dead Dialect — Malware speaks dead language, cannot execute in session

Dead Dialect flow chartcannot persist because persistence requires speaking a dialect that no longer exists. Every session generates a new cryptographic permutation of the instruction set — opcodes, syscall numbers, and register mappings all shuffled independently. A binary compiled for one session is dead in the next.
Two active layers: register remapping (21! ≈ 2^65) and syscall remapping (436! ≈ 2^3000+). Combined entropy: 2^3065+. Proven working inside Alpine Linux on emulated RISC-V under patched QEMU 8.2.0. 51/51 audit checks passing.
This is a research proof of concept. The idea came from Curtis Cole, implementation by Muhammad Bilal.
https://github.com/engrbilal992/DeadDialect
https://github.com/curtis1001010/DeadDialect

Top comments (0)