Skip to content
  • Home
  • About
  • Services
    • Vulnerability and Threat Intelligence
    • Threat Modeling and Risk Assessment
    • Penetration Testing
    • Source Code Review
    • Security Research
    • Security Consulting
  • Training
    • Linux kernel exploitation
    • Linux kernel development
    • Linux userland exploitation
  • Labs
    • Research
    • Publications
  • Blog
  • Contact
  • Language
    • English
    • Português

Allele Security Intelligence

Efficient information security services

Services

We offer, through our services, access to our knowledge base. The Allele team conducts research constantly and the result is directly applied to our services. We are a flexible and constantly changing company, evolving. Below we list the services currently offered.

  • Vulnerability and Threat Intelligence
  • Threat Modeling and Risk Assessment
  • Penetration Testing
  • Source Code Review
  • Security Research
  • Security Consulting
  • Twitter
  • Github
  • Linkedin
  • Bluesky
  • Mastodon
  • Instagram
  • Youtube
  • RSS

Services

Vulnerability and Threat Intelligence

Threat Modeling and Risk Assessment

Penetration Testing

Source Code Review

Security Research

Security Consulting

Training

Linux kernel exploitation

Linux kernel development

Linux userland exploitation

Publications

The importance of a rigorous methodology in information security research – NullByte Security Conference – 10th Edition

Redução da superfície de ataque ao kernel do Linux – SEMCOMP 2019

Introdução à pesquisa em vulnerabilidades no núcleo do Linux – EnSI 2018

Introdução à pesquisa em vulnerabilidades no núcleo do Linux – RoadSec Salvador 2018

Rootkits em kernel space – Redshift, um rootkit para o kernel do FreeBSD

Research

We discovered a use-after-free vulnerability in the core of the TCP subsystem of the Linux kernel (CVE-2024-36904).

We reported a nday vulnerability (CVE-2023-52922) affecting Red Hat Enterprise Linux 9 and its derivatives. The exploitation of the vulnerability allows the leaking of the encoded freelist pointer and the addresses of the slab.

We discovered two vulnerabilities in the CAN BCM subsystem. A use-after-free affecting the proc entry and an out-of-bounds read. CVE-2025-38003 and CVE-2025-38004.

Subscribe to our Blog

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

© 2025 Allele Security Intelligence.
All rights reserved. Privacy Policy.