You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A high-performance kernel-level traffic obfuscation engine based on the "QI-Value" theory.As the name suggests, "Qi-style values" operate as follows: for instance, the data is split into two packets—the first is sent as "pseudo-plaintext," while the second is sent as true, unencrypted data.
This is an original work; unauthorized reproduction will be prosecuted. Created on May 2 at 1:46 PM China Standard Time. This work is intended for educational and research purposes only and is strictly prohibited from being used for any illegal activities.
For usage instructions, please refer to my first repository project.
Core Theory: The QI-Value Theory ## What is "QI-Value"? QI-Value is a theory of traffic reshaping based on asymmetric information warfare. In traditional cybersecurity models, defense is static and passive. QI-Value, however, introduces "Logical Entropy" at the kernel level to artificially engineer information time-lags and traffic obfuscation, causing attackers or monitoring systems to lose their bearings amidst a massive volume of disguised data. Core Formula: Traffic Visibility $\neq$ Data Authenticity. When the ratio of "Decoy Traffic" to "Core Traffic" reaches a specific "QI-Value" equilibrium point, external monitoring becomes completely ineffective. ## Key Features: Dual-Packet Decoy Architecture: Leveraging kernel-level drivers, this architecture prefaces the transmission of a genuine data packet with a "fake plaintext" decoy—generated in the exact instant the real packet is sent—that precisely matches the characteristics of the target protocol. By exploiting the "first-packet inspection" inertia inherent in firewalls, it effectively cloaks the genuine data in invisibility. Distributed Mimicry Defense: The RMDB (Recursive Mimicry Defense Bot) Logic. The program does not exist as a single, monolithic process; instead, it disguises itself as a variable, random number of small helper processes, achieving a state of "great concealment within the bustling crowd" at the process level. Recursive Regeneration Mechanism: Employs a master-slave daemon logic. Upon detecting memory scanning or process tampering, the system automatically triggers a recursive regeneration sequence, completing a full logical migration and replica reconstruction within milliseconds. Certificate Watchdog (Cert-Watchdog): An independent monitoring system that continuously surveils the root certificate store and memory handles, providing physical-layer disconnection protection against MITM (Man-in-the-Middle) attacks.
git clone
$D_{Log}$ (Logical Deception): Logical Deception Degree. This metric quantifies both the protocol similarity and the volume of pseudo-connections—generated by the system—relative to actual connections. $C_{Att}$ (Attacker Cost): Attacker Cost. This metric measures the computational resources (e.g., packet decryption, AI modeling compute power) that an adversary must expend to analyze this traffic. $F_{Real}$ (Feature Reality): Real Feature Exposure. The lower this value, the better; it quantifies the extent to which real traffic fingerprints have been stripped away. $A_{DPI}$ (AI DPI Adaptation): AI Detection Adaptability. A higher value indicates that the AI system is more sensitive to noise, thereby rendering its own models more unstable. The underlying principle of the "Qi-Value" is as follows: by maximizing the numerator (deception and cost) while minimizing the denominator (real features and detection efficacy), it transforms the defender's low operational costs into high costs for the attacker, thereby achieving asymmetric sovereignty within cyberspace. 2. Dynamic Adaptive Loop (Lower Section of Diagram): The "Qi-Shield" is not a rigid firewall; rather, it is a kernel-driven, closed-loop control system comprising the following components: Kernel Intercept: The QI-Hijacker directly takes over traffic flowing through the physical network interface cards (NICs) at the Ring 0 level. Calculator Engine: This module performs real-time analysis across four dimensions: Logical Deception Degree, Attacker Cost, Real Feature Exposure, and the AI Detection Scatter Plot.
Currently in the Alpha Prototype stage. The QI-Value analysis and LSSD matrix generation are computationally intensive. Full-scale deployment requires high-performance heuristic processing units."
2. Mount the Kernel Driver (Requires Administrator Privileges)