Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH.
Raw mode is basically there to allow you to bypass some of the way that your computer handles TCP/IP. Rather than going through the normal layers of encapsulation/decapsulation that the TCP/IP stack on the kernel does, you just pass the packet to the application that needs it. No TCP/IP processing -- so it's not a processed packet, it's a raw packet. The application that's using the packet is now responsible for stripping off the headers, analyzing the packet, all the stuff that the TCP/IP stack in the kernel normally does for you.
A raw socket is a socket that takes packets, bypasses the normal TCP/IP processing, and sends them to the application that wants them.
Unless you're a programmer, a kernel hacker, or really really into security, you will most likely not need to deal much with these. But it's good to know what they are, in case you find yourself in one of the above scenarios.
https://en.wikipedia.org/wiki/Raw_socket
Deb based linux follow:
# apt-get install openssl-dev
or
# apt-get install ssldev or ssl-dev
on rpm based linux follow:
# yum install openssl-devel
To compile
# make
on server machine:
# bin/server
on client machine:
# bin/client the_SERVER_IP_addr (note don't use localhost or 127.0.0.1 put real ip addr, this version suport only IPV4)
To change keys edit /src/server.c and /src/client.c, and compile...