VOIDCAST

Send it into the void. Watch what screams back.

/// THE PROJECT

Deception as a Service.
Silence as a Weapon.

Voidcast is not just a proxy; it is a programmable blackhole. It sits on your network, listening to every whisper, scream, and probe—capturing the unknown while remaining invisible.

Whether you need to sink malicious traffic, replay fake services to deceive scanners, or tunnel requests through complex topologies, Voidcast provides the canvas for network deception.

Blackhole Logic

SINKD

Silently drops traffic while logging deep metadata. Acts as a network blackhole that listens on any port, captures headers, fingerprints, and payloads, then vanishes the connection into the void.

terminal — sinkd
voidcast sink --port 8080 --log-level debug
[INFO] Listening on 0.0.0.0:8080 (HTTP/TCP)
[INFO] Sink active. Null-routing incoming traffic.
[CONN] 192.168.1.42:53211 -> 8080 | PROTO: TCP
[RECV] GET /admin.php HTTP/1.1
[META] UA: Mozilla/5.0 (X11; Linux x86_64)
[DROP] Connection terminated. 0 bytes sent.

/// SCENARIO DATABASE

Field Operations

MODE: MIRAGE
CASE #401

Debug Flaky Webhooks

Simulate random 500 errors and timeouts to test how your application handles webhook failures.

OPEN DOSSIER>>
MODE: SINK
CASE #402

Trap SSH Scanners

Listen on port 22, log the connection attempt, and keep the socket open indefinitely to waste attacker resources.

OPEN DOSSIER>>
MODE: DRIFT
CASE #403

Simulate High Latency

Proxy traffic to your local backend but inject 200-500ms of jitter to test frontend loading states.

OPEN DOSSIER>>

/// BLUEPRINT

System Architecture

🌐
CLIENT
// SOURCE
VOIDCAST
CORE PROXY
MOD_01SINK
MOD_02MIRAGE
MOD_03DRIFT

/// MISSION LOG

Trajectory

01

EVENT HORIZONACTIVE

CURRENT

Core proxy engine active. Sink, Mirage, and Drift modules operational. Initial CLI release.

02

SINGULARITY

Q3 2025

AI-driven traffic analysis. Automated deception profiles based on attacker behavior.

03

SUPERNOVA

Q4 2025

Distributed sinkhole clusters. Global threat intelligence sharing. Multi-node orchestration.

/// ETHOS

"The network is a dark forest.
We build the traps."

Traditional security builds walls. We build mirrors. Voidcast is born from the idea that the best way to understand an adversary—or a bug—is to let it happen, but on your terms.

Instead of closing a port, we leave it open. Instead of blocking a request, we record it. We believe that silence is information, and deception is the ultimate form of observation.

Whether you are a security researcher analyzing botnet behavior, or a developer debugging a flaky microservice, you need a tool that can listen to the void and report back what screams.