qjerome

Working at the intersection of security & code @circl / @0xrawsec. Aiming for a better, more open tech world. Developing in #rustlang, #golang and #python. Author of @kunai_project and several others.

qjerome boosted:
Martin Boller πŸ‡¬πŸ‡± πŸ‡ΊπŸ‡¦ :tux: :freebsd: :windows: :mastodon:itisiboller@infosec.exchange
2025-06-20

There's some cool sounding training on its way from @circl

CIRCL - Virtual Summer School (VSS) 2025

circl.lu/pub/vss-2025/

#MISP #AIL #LookyLoo #Lacus #Pandora #Kunai #DFIR #ThreatHunting #FlowIntel #Cerebrate #VulnerabilityLookup #GCVE

qjerome boosted:
abuse.ch :verified:abuse_ch@ioc.exchange
2025-06-20

We are happy to announce the integration of @kunai_project Linux Sandbox on MalwareBazaar πŸ₯³

Sample ELF X86 report ‡️
bazaar.abuse.ch/sample/0d2211b

qjerome boosted:
Etienne / Tektek@todon.eu
2025-06-19

The @circl is running several online training on forensics and threat intelligence tools in July, they look really interesting:
Virtual Summer School (VSS) 2025
circl.lu/pub/vss-2025/

qjerome boosted:
2025-06-13

If you're already a GNA, we've created a set of logos you can use to show that you're a GCVE Numbering Authority (GNA).

πŸ”— gcve.eu/logo/

πŸ”— If you want to become a GNA gcve.eu/about/#eligibility-and

#gna #gcve #vulnerabilitymanagement #cve

GNA - GCVE.eu logo
qjerome boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-06-12

New release: FlowIntel 1.6.0 β€” an open-source case management tool β€” now with extended support for importing MISP events as cases, a timeline view for attributes, a new templating system for notes, and many other new features!

πŸ”— github.com/flowintel/flowintel
πŸ”— github.com/flowintel/flowintel

@misp @circl

#opensource #threatintel #threatintel #dfir #cti #misp #flowintel

Thanks to @davcru for the continuous work on the project and all the new contributors.

The dashboard overview of FlowIntel.
qjerome boosted:
2025-06-10

πŸŽ‰ Just dropped a new Kunai release! πŸŽ‰

We've been working hard on some exciting new features and performance boosts that we can't wait for you to try out! Here's what's new:

New Features:
πŸ” Track io_uring operations with new io_uring_sqe events!
πŸ“ Get more context with parent command line information for execve and execve_script events.
πŸ”Ž Get information about matching filtering rules in final events.
πŸ§ͺ Test your filters with ease using the new test command.

Improvements:
⚑ Experience performance boosts thanks to changes in the event matching engine and code refactoring.

Ready to dive in? Check out the full release notes here: github.com/kunai-project/kunai

Don't hesitate to give Kunai a try and share your feedback! Let's make Kunai even better together!

#Linux #ThreatHunting #ThreatDetection #DFIR #DetectionEngineering #OpenSource

qjerome boosted:
2025-06-06

πŸš€ Kunai Sandbox is now live! πŸš€

Curious about Kunai? Want to analyze Linux malware logs? Or share malware analysis to build detection rules? Kunai Sandbox has you covered! πŸ›‘οΈ

πŸ” Check out what Kunai can do:
βœ… Explore Kunai's log structure without running it locally
βœ… Analyze logs generated by Linux malware
βœ… Share malware analysis with others to build detection rules

πŸ”— See an example analysis of the perfctl #linux #malware: sandbox.kunai.rocks/analysis/5

#detectionengineering #infosec #dfir #soc

qjerome boosted:
2025-06-02

πŸš€ New Blog Post: Kunai vs io_uring (why.kunai.rocks/blog/kunai-vs-) πŸš€

πŸ’‘ Ever wondered how io_uring revolutionizes I/O operations in the Linux kernel? Inspired by Armo's blog post (armosec.io/blog/io_uring-rootk) about a PoC rootkit using io_uring, we explored this feature's security implications and how tools like Kunai can monitor these operations.

πŸ” Key Takeaways:
πŸ”Ή io_uring boosts I/O performance by reducing system call overhead and enabling asynchronous operations
πŸ”Ή Security tools struggle to monitor io_uring due to its unique handling of operations
πŸ”Ή Kunai now provides visibility into io_uring operations, though blocking malicious activities remains challenging
πŸ”Ή Recent kernel versions have introduced auditing and security controls for io_uring, but these are still limited

πŸ“– Read more: why.kunai.rocks/blog/kunai-vs-

#Linux #io_uring #Security #OpenSource #ThreatDetection #SOC #DFIR

qjerome boosted:
2025-05-19

The hack.lu 2025 Call for Papers closes in just 1 day! If you’ve been planning to submit a talk, workshop, or lightning talk β€” now’s the time to do it.

#conference #luxembourg #infosec #hacklu2025 #hacklu #cybersecurity

πŸ”— hack.lu/blog/hack.lu-2025-call

2025-05-07

@FLOSS_Weekly @JP_Bennett @adulau Really enjoyed sharing this moment to chat with you guys !

qjerome boosted:
2025-05-07

This week, @JP_Bennett chatted Linux security with @adulau and @qjerome ! It's Kunai and CIRCL talking threat detection, why your security solution should be using eBPF and more! See the whole thing at hackaday.com/2025/05/07/floss-

qjerome boosted:
2025-05-02

πŸ₯· Calling all Kunai Ninjas! πŸ₯·

We're happy to announce the launch of the Kunai Community Hub – a collaborative space where you can share your architecture overviews, deployment tips, and any other useful information about Kunai.

Why Join the Kunai Community Hub?

- Share Your Expertise: Contribute your knowledge and experiences to help others in the community.
- Learn from Others: Discover best practices, architectural insights, and deployment strategies from fellow Kunai users.
- Connect and Collaborate: Engage with the community of Kunai users.

Join the Conversation:

We can't wait to see what you share! Whether it's a detailed architecture overview, deployment tips, or insights on scaling, your contributions will help build a stronger and more knowledgeable Kunai community.

Get Started:

Visit the Kunai Community Hub on GitHub: github.com/kunai-project/commu

#OpenSource #Linux #Malware #ThreatHunting #DFIR #SOC #DetectionEngineering

Thank you for being part of the Kunai journey!

qjerome boosted:
2025-04-30

@kunai_project, the better-than-sysmon Linux eBPF logging tool, now has a sandbox for running samples! github.com/kunai-project/sandb

And there's even a handy web UI!

github.com/kunai-project/sandb

2025-01-27

@lcamtuf 🀣 🀣 🀣

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst