Products & Tools
Cybersecurity Solutions
Discover our comprehensive suite of cybersecurity solutions that combine enterprise-grade commercial products with powerful open-source tools. Whether you're protecting critical infrastructure or building custom security workflows, we have the right solution for your needs.
DaemonEye
Open SourceHigh-performance security process monitoring system with audit-grade integrity. Detect process anomalies, hollowing attacks, and suspicious behavior across your infrastructure.
- Real-time process monitoring with <5% system overhead
- Cross-platform security monitoring for Linux, macOS, and Windows
- SQL-based custom detection rules with flexible anomaly detection
dbsurveyor
Open SourceFast, offline database schema discovery and sampling. Understand unfamiliar databases quickly with portable reports.
- Schema + sample extraction with throttle control
- Portable outputs with optional compression and AES-GCM encryption
- Markdown/JSON reports and SQL reconstruction
Gold Digger
Open SourceRust CLI for MySQL/MariaDB query execution and structured data export. Designed for operators who need reliable, reproducible data extraction.
- MySQL/MariaDB support with secure TLS connections
- Structured outputs: CSV, JSON, TSV with deterministic formatting
- Built for automation (cron, CI/CD) and offline-first environments
opnDossier
Open SourceReadable reports from OPNsense configs. Turns OPNsense config.xml files into clear, operator-ready documentation with optional audit reporting.
- Convert: structured Markdown/JSON/YAML (summary or comprehensive)
- Display: themed terminal rendering with syntax highlighting
- Audit: standard/blue/red reports with findings and recommendations
Airgap Package Fetcher
Open SourceOffline bundles for pip, apt, Docker, and Homebrew. Fetch and ship complete dependency trees for airgapped installs.
- Offline-first: bundles install with zero network access
- Multi-ecosystem: pip, apt, Docker images, Homebrew
- Integrity: SHA256/SHA512 checksums, optional signatures
Custom R&D
EnterpriseTailored cybersecurity research and development for unique organizational challenges.
- Custom solutions
- Expert consultation
- Proof of concept
Detection Toolkit
EnterpriseOffline detection rule testing that actually runs in labs. Validate Sigma and more with deterministic test workflows.
- Declarative test definitions (YAML/JSON) executed by an orchestrator
- Sigma + JSONL MVP with pass/fail assertions and checksums
- Structured outputs (JSON/Markdown/JUnit) for audits and CI
NetflowWatcher
EnterpriseLocal-first network flow anomaly detection with feedback
- Ingest SiLK/nfdump-style flows and normalize
- Online anomaly scoring blended with supervised feedback
- Review/label/export flows in a web UI; Docker Compose deployment
Enterprise Solutions
Professional-grade cybersecurity tools designed for enterprise environments. Get commercial support, SLAs, and custom development services.
- 24/7 Commercial Support
- Service Level Agreements
- Custom Development
- Integration Support
Open Source Tools
Community-driven projects that provide powerful cybersecurity capabilities while maintaining transparency and accessibility.
- MIT & Apache 2.0 Licensed
- Community Support
- Full Source Access
- Contribution Welcome
Ready to Get Started?
Whether you need enterprise-grade security solutions or want to contribute to our open-source projects, we're here to help you build a more secure digital infrastructure.