Features
Grsecurity provides a full suite of synergistic defenses, from security-enhanced compilation and our world-class memory corruption defenses to access control.
Memory
Corruption Defenses
We're best known for our memory corruption defenses, whose effectiveness have been repeatedly validated by their eventual adoption in all mainstream operating systems and even processor hardware.
Learn moreFilesystem
Hardening
Our filesystem defenses help isolate users through heavily-hardened chroot jails, preventing webservers from being tricked by symlinks pointing to other users' directories, and much more.
Learn moreMiscellaneous
Protections
We offer a number of unique defenses, like automatically limiting the attack surface of highly-modular kernels without impacting usability.
Learn moreRBAC
Our Role Based Access Control system auto-learns least privilege policies for an entire system in minutes. Policy enforcement ensures a secure base and helps eliminate manual policy mistakes.
Learn moreGCC
Plugins
Defeating ROP, improving entropy on IoT devices, defusing uninitialized stack infoleaks, preventing many exploitable integer overflows: our GCC plugins make it possible.
Learn more