π₯ Kunai v0.5.0: Sharpened and Forged for Peak Performance! π₯
We're happy to announce that Kunai v0.5.0 is now available, freshly forged with new features and enhancements designed to boost your system observability.
π Get More Visibility Than Ever:
start
event.error
event. Stay informed about issues affecting your system's operation and take immediate action.event_loss
event! Get notified if the userland component can't keep up with the kernel's event rate, enabling you to address potential data loss and system load issues.βοΈ Enhanced Control and Efficiency:
Ready to supercharge your system monitoring with Kunai? Check out our documentation to get started today!
π https://why.kunai.rocks/docs/next/quickstart
View the full release details here: https://github.com/kunai-project/kunai/releases/tag/v0.5.0
Try it out, report any bugs or issues, and let's improve this together! Your feedback is invaluable.
[#]linux #ebpf #opensource #linux #observability #monitoring #security
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
π Important Announcement from the Kunai Project! π
Weβre proud to share that the Kunai Project will be participating in Hackathon.lu 2025 on April 8th and 9th! π
Hackathon.lu (https://hackathon.lu/) is a fantastic opportunity to come together with individuals who share a passion for making great things accessible to everyone. Our goal is to provide open-source cybersecurity tools that are free and available to all, and this event is a chance to collaborate on ideas that benefit the entire community.
Whether youβre a developer, security researcher, or tech enthusiast, weβd love to connect with you. Letβs work together toward a common goal and create something meaningful!
Not interested in collaborating on Kunai? No problem! There are several other amazing projects to explore: https://hackathon.lu/projects. Weβre sure youβll find one meaningful for you.
π When: April 8-9, 2025
π Details: https://hackathon.lu/
π Explore Kunai: https://github.com/kunai-project/kunai
Join us in building tools that empower and protect everyone. Together, we can make a difference!
[#]OpenSource #CyberSecurity #Linux #ThreatHunting
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
π Exciting News: Kunaiβs Latest Release is Here! π
Weβre excited to announce the newest release of Kunai, an open-source security monitoring and hunting tool for Linux systems! This version introduces many fixes and features to improve flexibility, performance, and usability.
Whatβs new?
π§ Fixes: Improved process tracking ensures that even zombie processes canβt escape detection!
π Enhancements: Simplified configuration and accurate process ancestorship tracking.
π New Features:
- Composite Rules: Modular, reusable rules for efficiency and simplicity.
- String Templates: YAML-based templates for concise, maintainable rules.
- File Create Event Tracking and more!
π Documentation is updated with all the changes at: http://why.kunai.rocks/
Dive into the release details: http://github.com/kunai-project/kunai/releases/tag/v0.4.0
[#]OpenSource #Linux #DFIRΒ #SOC #ThreatHunting
=> More informations about this toot | View the thread
π New Stable Release is here! π
Packed with powerful updates:
Plus, enjoy enhanced event filtering, new ptrace events, and overall stability improvements.
Check it out: https://github.com/kunai-project/kunai/releases/tag/v0.3.0
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
Working on code is enjoyable, while working on documentation is a bit less exciting, but it's necessary to ensure happy users. Iβve always been disappointed when looking at the documentation page for Microsoft Sysmon. This is why I chose not to repeat that mistake with Kunai! Take a look at the latest documentation update if you want to know what to expect in the next stable release.
π https://why.kunai.rocks/docs/next/quickstart
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
π Weβre happy to announce the beta release of Kunai v0.3.0-beta.1!
π Notable Features:
:2001: New Event Monitoring: Introducing file monitoring for events that are written and then closed, enhancing your detection capabilities!
π Corelight Community-ID Integration: Seamlessly integrate with Corelight's community-ID for enriched threat detection.
π οΈ Enhanced CLI Options: New command-line options now available to show logs and install Kunai as a service effortlessly!
Check out the full release notes here: https://github.com/kunai-project/kunai/releases/tag/v0.3.0-beta.1
Try it out and let us know what you think! Your feedback is invaluable as we continue to improve Kunai. π¬β¨
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
@corelight Community-ID is now integrated into Kunai and will appear in connect, dns_query, and send_data events. This enhancement enables correlating Kunai logs with external traffic analysis tools such as IDS. A direct application of this is determining which Linux process generated traffic observed by your analysis tool. I see this as a great way to narrow down host activity that triggered a network alert. Big thanks to @Regit for proposing this idea during @passthesaltcon
This feature is not yet documented but is available in the latest alpha release: https://github.com/kunai-project/kunai/releases/tag/v0.3.0-alpha.2
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
π For those wondering how to gain visibility on their #Linux system for #ThreatDetection and #ThreatHunting:
Check out the Kunai Project! It's completely free and supports IoC-based detection, Yara rules, custom detection rules, and more.
A new release is available: https://github.com/kunai-project/kunai/releases
=> More informations about this toot | View the thread
π A public preview of new features landing soon in the Kunai Project:
π£ You can even detect #malware in #linux containers (see example)
Follow progress: https://github.com/kunai-project/kunai
=> View attached media | View attached media
=> More informations about this toot | View the thread
Just released a small diagnostic tool for kunai: https://github.com/kunai-project/tools/blob/main/kunai-stats.py
It can be used to evaluate the number of events and volume of data generated by a given configuration.
=> More informations about this toot | View the thread
π§ Currently working on a protection feature for Kunai using eBPF LSM hooks! So far, any attempts to kill or ptrace are blocked. I haven't explored all the ways one can tamper with or stop a #Linux process yet. I'm counting on you π to share what you know about it.
=> More informations about this toot | View the thread
=> This profile without reblog | Go to kunai_project@infosec.exchange account This content has been proxied by September (3851b).Proxy Information
text/gemini