Open source Security R&D
We publish real, testable artifacts—kernel modules, compiler passes, and analysis tools—so defenders can measure, break, and harden systems.
Innovative approach in security.
★★★★★
What we do
We publish verifiable security research—code, papers, and reproducible experiments—focused on Linux kernel internals and compiler toolchains. Our work helps blue teams test detection, vendors harden products, and researchers compare techniques apples-to-apples.
Kernel research. Loadable modules, stealth/detection studies, forensics evasion vs. countermeasures.
Compiler security. Obfuscation and hardening passes; analysis that exposes optimization-stage blind spots.
Tooling. Scripts, debuggers, and test harnesses that make experiments repeatable.
Trainings & knowledge transfer. Hands-on, lab-first workshops with ready-to-run QEMU images and reproducible labs; teams leave with working setups, checklists, and code.
Why open source
Transparency beats claims. Anyone can reproduce our results.
Faster hardening. Public code shortens feedback loops between researchers and vendors.
Shared baselines. The community can test against the same artifacts and improve them together.


Security Research Services
We specialize in enhancing security for Linux kernels and compilers through innovative open-source projects.
Kernel Module Security
Our loadable kernel module challenges security for Linux kernel versions 5 and later, ensuring robust proactive defenses.
Compiler Passes & Security
We provide a collection of compiler passes and tools aimed at identifying vulnerabilities in x86, ARM, and RISC-V binaries.
We deliver comprehensive, hands-on training in Linux Kernel Threats & Defenses.
Trainings
Contact Us
Reach out for inquiries about Linux security research and projects.