Open source Security R&D

We publish real, testable artifacts—kernel modules, compiler passes, and analysis tools—so defenders can measure, break, and harden systems.

A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.

Innovative approach in security.

★★★★★

What we do

We publish verifiable security research—code, papers, and reproducible experiments—focused on Linux kernel internals and compiler toolchains. Our work helps blue teams test detection, vendors harden products, and researchers compare techniques apples-to-apples.

  • Kernel research. Loadable modules, stealth/detection studies, forensics evasion vs. countermeasures.

  • Compiler security. Obfuscation and hardening passes; analysis that exposes optimization-stage blind spots.

  • Tooling. Scripts, debuggers, and test harnesses that make experiments repeatable.

  • Trainings & knowledge transfer. Hands-on, lab-first workshops with ready-to-run QEMU images and reproducible labs; teams leave with working setups, checklists, and code.

A computer screen displaying system information for a Debian GNU/Linux distribution. The background is dark with a prominent logo formed by ASCII art. Technical details such as OS version, host name, uptime, resolution, and other specs are presented in white and red text.
A computer screen displaying system information for a Debian GNU/Linux distribution. The background is dark with a prominent logo formed by ASCII art. Technical details such as OS version, host name, uptime, resolution, and other specs are presented in white and red text.

Why open source

  • Transparency beats claims. Anyone can reproduce our results.

  • Faster hardening. Public code shortens feedback loops between researchers and vendors.

  • Shared baselines. The community can test against the same artifacts and improve them together.

Bright living room with modern inventory
Bright living room with modern inventory

Security Research Services

We specialize in enhancing security for Linux kernels and compilers through innovative open-source projects.

Kernel Module Security

Our loadable kernel module challenges security for Linux kernel versions 5 and later, ensuring robust proactive defenses.

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
Compiler Passes & Security

We provide a collection of compiler passes and tools aimed at identifying vulnerabilities in x86, ARM, and RISC-V binaries.

We deliver comprehensive, hands-on training in Linux Kernel Threats & Defenses.

Trainings
The image features a computer screen displaying a coding environment. The screen shows a text editor with various files and folders listed on the left-hand side, while the main coding area is open with a command line interface. There are green text outputs typical of command line operations performed on a black background.
The image features a computer screen displaying a coding environment. The screen shows a text editor with various files and folders listed on the left-hand side, while the main coding area is open with a command line interface. There are green text outputs typical of command line operations performed on a black background.
A dimly lit room with multiple computer screens displaying lines of code. The silhouette of a person sitting in front of the screens creates a mysterious and anonymous atmosphere. The code visible includes colorful syntax highlighting, typical of programming environments.
A dimly lit room with multiple computer screens displaying lines of code. The silhouette of a person sitting in front of the screens creates a mysterious and anonymous atmosphere. The code visible includes colorful syntax highlighting, typical of programming environments.

Our Projects

Explore our security-focused open source projects.

Text written on a computer screen displays programming code with comments. The code uses C syntax, featuring the use of 'typedef' to define character constants. Some text appears in green, suggesting it is a comment, while other code is in blue and white, indicating keywords and standard text respectively.
Text written on a computer screen displays programming code with comments. The code uses C syntax, featuring the use of 'typedef' to define character constants. Some text appears in green, suggesting it is a comment, while other code is in blue and white, indicating keywords and standard text respectively.
KoviD - Linux Kernel Module

A loadable kernel module for enhanced Linux security.

A dark background with colorful lines of code in various programming languages displayed on a screen. The text includes snippets of functions and logical statements.
A dark background with colorful lines of code in various programming languages displayed on a screen. The text includes snippets of functions and logical statements.
A security post with large glass windows under a slanted roof. The building is primarily grey with prominent red accents. In the background, there are lush green trees and overcast skies, suggesting a cloudy day. The post has 'POS SECURITY 02' written on it.
A security post with large glass windows under a slanted roof. The building is primarily grey with prominent red accents. In the background, there are lush green trees and overcast skies, suggesting a cloudy day. The post has 'POS SECURITY 02' written on it.
A person wearing a 'Securite Circuit' shirt is standing with their back to the camera, holding a communication device to their ear. They are surrounded by other people, some of whom are also visible in the background, wearing casual clothing. The setting suggests a place with heightened security or an event requiring security oversight.
A person wearing a 'Securite Circuit' shirt is standing with their back to the camera, holding a communication device to their ear. They are surrounded by other people, some of whom are also visible in the background, wearing casual clothing. The setting suggests a place with heightened security or an event requiring security oversight.
Kovid Obfuscation

Compiler passes targeting vulnerabilities in various architectures.

gray computer monitor

Contact Us

Reach out for inquiries about Linux security research and projects.