📘 Overview
Floatboat is a secure and modular execution environment built to support the SPELF (Secure Portable Executable Linktable Formattable) format. The primary aim of Floatboat is to deliver advanced protection mechanisms for executable files and deter unauthorized access or reverse engineering attempts.
The "Floatboat" name metaphorically represents the idea of a solitary, secure vessel floating amidst an ocean of threats—much like how executables exist in today’s hostile cyber landscape. Traditional binary formats are often vulnerable to cracking, dumping, disassembly, and reverse engineering. While many software solutions attempt to mitigate these threats via web authentication or obfuscation, Floatboat introduces a new legal and technical layer of protection.
With SPELF and Floatboat, developers gain the ability to conditionally disable the attacker's system based on memory footprints, process identifiers, or unauthorized system modifications—without needing full system privileges. Once a violation is detected and verified, a counter-response mechanism is triggered, halting the attack through controlled memory manipulation or process interruption.

📦 SPELF Format Specification
The SPELF format consists of the following segments:
- Header: Contains metadata, security checksums, and versioning info.
- Code Segment: Holds encrypted or signed instruction sets.
- Linktable: References to external memory or symbol addresses.
- Resource Section: Includes embedded static data or formattable blobs.
[ SPELF HEADER ]
[ CODE SEGMENT ]
[ LINKTABLE ]
[ RESOURCES ]
🛠️ Installation & Usage
To execute a SPELF-compatible file, run the following command using the Floatboat runtime:
serialkiller-rs-stable serialkiller run secure_program
🧭 CLI Interface
Available command-line tools:
# File watcher tool
serialkiller-rs-stable serialk-watcher --include --liner-street <filename>
# Permission manager (requires root)
sudo serialkiller-rs-stable permission-manager --user <username>
# Help menu
serialkiller-rs-stable --help