Our Projects

Defense Unicorns is Open Source

Defense Unicorns's vision is Freedom and Independence Globally; open source is foundational to that mission.

Defense Unicorns open source projects illustration

Our open-source projects support our Mission Heroes while providing transparency and security.

Air Gap Software Delivery

A free open source tool that enables continuous software delivery on systems that are disconnected from the internet

Checkmark icon
Package and deploy to air-gapped systems
Checkmark icon
Consistently deploys the same capabilities for highly distributable systems
Checkmark icon
Provides SBOM Support
Checkmark icon
Works while connected too!
Illustration of a folder representing packaged applications and resources

Securely Package Apps and Resources

Provides the ability to package a chunk of the internet and then securely deliver all of the files and dependencies needed to run an application in a disconnected environment.

Illustration representing cloud deployment in disconnected environments

Deploy Cloud Apps While Disconnected

Provides the ability to deploy apps declaratively and without internet connectivity. Opening up the door for modern cloud capabilities to be deployed in disconnected environments.

Illustration of a server representing application maintenance

Easily Maintain Apps While Disconnected

Zarf reduces the skill & resources needed to manage and update applications in disconnected environments, ensuring no down time or data loss when updating software.

Kubernetes Middleware for Systems Integration

Pepr helps IT Ops teams of all skill levels manage and modify resources in a Kubernetes (K8s) cluster using easy to read and write configuration modules.

Checkmark icon
Automatically integrate your COTS or GOTS application
Checkmark icon
Reduce human in the loop IT Ops checklists
Checkmark icon
IT domain expertise as code so your mission system survives changeovers
Checkmark icon
Makes systems of systems integration easy
Checkmark icon
Framework for creating Kubernetes Operators and Admission Controllers
Network connectivity illustration

Create Robust Policy Engines

Codify security policy into corrective Pepr modules that can identify and remediate risk through automatically enforcing K8s best practices.

System settings configuration illustration

Seamlessly Connect Applications

Automate the integration of mission capabilities into complex systems with Pepr modules that are reusable across multiple systems.

Automation gears illustration

Automate K8s Scripts

Remove the need for human intervention when issues arise in the cluster or application, by using Pepr modules to remediate the event.

Kubernetes Compliance Engine

Lula bridges the gap between expected configuration required for compliance and actual configuration.

Checkmark icon
Turn your configuration into NIST control verification
Checkmark icon
Automate SCA and AO enforcement
Checkmark icon
Accelerate your ATO timelines
Checkmark icon
Turn compliance as spreadsheet into compliance as code
Control declarations icon

Shift Control Declarations Left

NIST OSCAL native by design means your data is independent and not locked into any proprietary format.

Runtime validation icon

Validate Controls in runtime

Automate the validation of control assessment by comparing the required configuration against the current configuration of your live environment

ATO automation icon

Automate Your ATOs

Continuously collect and validate your control assessments to detect drift and better secure your systems