VOIDCAST
VOIDCAST
Send it into the void.
Watch what screams back.
/// THE PROJECT
Deception as a Service.
Silence as a Weapon.
Voidcast is not just a proxy; it is a programmable blackhole. It sits on your network, listening to every whisper, scream, and probe—capturing the unknown while remaining invisible.
Whether you need to sink malicious traffic, replay fake services to deceive scanners, or tunnel requests through complex topologies, Voidcast provides the canvas for network deception.
Blackhole Logic
SINKD
Silently drops traffic while logging deep metadata. Acts as a network blackhole that listens on any port, captures headers, fingerprints, and payloads, then vanishes the connection into the void.
/// SCENARIO DATABASE
Field Operations
Debug Flaky Webhooks
Simulate random 500 errors and timeouts to test how your application handles webhook failures.
Trap SSH Scanners
Listen on port 22, log the connection attempt, and keep the socket open indefinitely to waste attacker resources.
Simulate High Latency
Proxy traffic to your local backend but inject 200-500ms of jitter to test frontend loading states.
/// BLUEPRINT
System Architecture
/// MISSION LOG
Trajectory
EVENT HORIZONACTIVE
CURRENTCore proxy engine active. Sink, Mirage, and Drift modules operational. Initial CLI release.
SINGULARITY
Q3 2025AI-driven traffic analysis. Automated deception profiles based on attacker behavior.
SUPERNOVA
Q4 2025Distributed sinkhole clusters. Global threat intelligence sharing. Multi-node orchestration.
/// ETHOS
"The network is a dark forest.
We build the traps."
Traditional security builds walls. We build mirrors. Voidcast is born from the idea that the best way to understand an adversary—or a bug—is to let it happen, but on your terms.
Instead of closing a port, we leave it open. Instead of blocking a request, we record it. We believe that silence is information, and deception is the ultimate form of observation.
Whether you are a security researcher analyzing botnet behavior, or a developer debugging a flaky microservice, you need a tool that can listen to the void and report back what screams.