Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities. It collects and correlates system events, allowing for advanced threat detection and incident response. Kunai is designed to work seamlessly with Linux namespaces and container technologies, providing visibility into containerized environments. Kunai's kernel components are written in eBPF and run as probes, collecting relevant information for security monitoring. The collected data is then passed to a userland program for re-ordering, enriching, and correlating events. Kunai is built using Rust and the Aya library, and is available as a standalone binary that includes both the eBPF probes and the userland program. Kunai provides a range of features, including event sorting, on-host correlation, and event enrichment. It also supports Linux namespaces and container technologies, allowing for monitoring of containerized environments. Kunai is designed to be highly customizable, with a focus on ease of use and scalability. Kunai is available under an open-source license and is compatible with a wide range of Linux distributions.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
An endpoint monitoring tool for Linux and macOS that reports file, socket, and process events to Zeek.
All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.
Comprehensive endpoint security solution providing proactive defenses, remediation tools, and centralized management to prevent threats and ensure uptime.
Cisco Secure Endpoint is a cloud-native endpoint security solution that provides advanced protection and response to threats.
CrowdStrike Falcon Insight XDR is an AI-powered endpoint detection and response solution that provides comprehensive protection, visibility, and automated response capabilities.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
Absolute Security provides a comprehensive cybersecurity platform that offers endpoint-to-network access coverage, automated security compliance, and secure endpoint and access solutions.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.