Our Projects

Defense Unicorns is Open Source


Defense Unicorns' vision is Freedom and Independence Globally;
open source is foundational to that mission.

Defense Unicorns open source projects illustration
Air Gap Software Delivery

Air Gap Software Delivery


A free open source tool that enables continuous software delivery on systems that are disconnected from the internet

Checkmark icon

Package and deploy to air-gapped systems

Checkmark icon

Consistently deploys the same capabilities for highly distributable systems

Checkmark icon

Provides SBOM Support

Checkmark icon

Works while connected too!

Illustration of a folder representing packaged applications and resources

Securely Package Apps
and Resources

Provides the ability to package a chunk of the internet and then securely deliver all of the files and dependencies needed to run an application in a disconnected environment.

Illustration representing cloud deployment in disconnected environments

Deploy Cloud Apps While Disconnected

Provides the ability to deploy apps declaratively and without internet connectivity. Opening up the door for modern cloud capabilities to be deployed in disconnected environments.

Illustration of a server representing application maintenance

Easily Maintain Apps While Disconnected

Zarf reduces the skill & resources needed to manage and update applications in disconnected environments, ensuring no down time or data loss when updating software.

Kubernetes Middleware for Systems Integration

Kubernetes Middleware for Systems Integration


Pepr helps IT Ops teams of all skill levels manage and modify resources in a Kubernetes (K8s) cluster using easy to read and write configuration modules.

Checkmark icon

Automatically integrate your COTS or GOTS application

Checkmark icon

Reduce human in the loop IT Ops checklists

Checkmark icon

IT domain expertise as code so your mission system survives changeovers

Checkmark icon

Makes systems of systems integration easy

Checkmark icon

Framework for creating Kubernetes Operators and Admission Controllers

Network connectivity illustration

Create Robust
Policy Engines

Codify security policy into corrective Pepr modules that can identify and remediate risk through automatically enforcing K8s best practices.

System settings configuration illustration

Seamlessly Connect Applications

Automate the integration of mission capabilities into complex systems with Pepr modules that are reusable across multiple systems.

Automation gears illustration

Automate
K8s Scripts

Remove the need for human intervention when issues arise in the cluster or application, by using Pepr modules to remediate the event.

Kubernetes Compliance Engine

Kubernetes Compliance Engine


Lula bridges the gap between expected configuration required for compliance and actual configuration.

Checkmark icon

Turn your configuration into NIST control verification

Checkmark icon

Automate SCA and AO enforcement

Checkmark icon

Accelerate your ATO timelines

Checkmark icon

Turn compliance as spreadsheet into compliance as code

Control declarations icon

Shift Control
Declarations Left

NIST OSCAL native by design means your data is independent and not locked into any proprietary format.

Runtime validation icon

Validate Controls
in runtime

Automate validation of control assessment by comparing the required configuration against your current live environment.

ATO automation icon

Automate
Your ATOs

Continuously collect and validate your control assessments to detect drift and better secure your systems

Ready to Secure Your Mission?

Let's get started with a quick conversation to help us understand your challenges. Simply fill out the form below and our solutions experts will be in touch shortly.

Loading...