Awesome
<p align="center" > <a href="https://www.fibratus.io" > <img src="logo.png" alt="Fibratus"> </a> </p> <h2 align="center">Fibratus</h2> <p align="center"> Adversary tradecraft detection, protection, and hunting <br> <a href="https://www.fibratus.io/#/setup/installation"><strong>Get Started »</strong></a> <br> <br> <strong> <a href="https://www.fibratus.io">Docs</a> • <a href="https://github.com/rabbitstack/fibratus/tree/master/rules">Rules</a> • <a href="https://github.com/rabbitstack/fibratus/tree/master/filaments">Filaments</a> • <a href="https://github.com/rabbitstack/fibratus/releases">Download</a> • <a href="https://github.com/rabbitstack/fibratus/discussions">Discussions</a> </strong> </p>
Fibratus detects, protects, and eradicates advanced adversary tradecraft by scrutinizing and asserting a wide spectrum of system events against a behavior-driven rule engine and YARA memory scanner.
Events can also be shipped to a wide array of output sinks or dumped to capture files for local inspection and forensics analysis. You can use filaments to extend Fibratus with your own arsenal of tools and so leverage the power of the Python ecosystem.
In a nutshell, the Fibratus mantra is defined by the pillars of realtime behavior detection, memory scanning, and forensics capabilities.
Installation
- Download the latest MSI package and follow the UI wizard or
alternatively install via
msiexec
in silent mode
$ msiexec /i fibratus-2.3.0-amd64.msi /qn
Quick start
- spin up a command line prompt
- list credentials from the vault by using the
VaultCmd
tool
$ VaultCmd.exe /listcreds:"Windows Credentials" /all
Credential discovery via VaultCmd.exe
rule should trigger and emit the alert to the Eventlog. Check the short demo here.
Documentation
To fully exploit and learn about Fibratus capabilities, read the docs.
Rules
Detection rules live in the rules
directory of this repository. The CLI provides a set of
commands to explore the rule catalog, validate the rules, or create a new rule from the template.
To describe all rules in the catalog, use the fibratus rules list
command. It is possible to pass the
-s
flag to show rules summary by MITRE tactics and techniques.
Contributing
We love contributions. To start contributing to Fibratus, please read our contribution guidelines.
Code Signing Policy
Free code signing provided by SignPath.io, certificate by SignPath Foundation. All releases are automatically signed.
<p align="center"> Developed with ❤️ by <strong>Nedim Šabić Šabić</strong> </p> <p align="center"> Logo designed with ❤️ by <strong><a name="logo" target="_blank" href="https://github.com/karinkasweet/">Karina Slizova</a></strong> </p>