Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

github.com/rabbitstack/fibratus

Package Overview
Dependencies
Alerts
File Explorer
Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

github.com/rabbitstack/fibratus

  • v1.10.0
  • Source
  • Go
  • Socket score

Version published
Created
Source

Fibratus

Fibratus

A modern tool for Windows kernel exploration and observability with a focus on security
Get Started »

Docs   •   Filaments   •   Download   •   Discussions

What is Fibratus?

Fibratus is a tool for exploration and tracing of the Windows kernel. It lets you trap system-wide events such as process life-cycle, file system I/O, registry modifications or network requests among many other observability signals. In a nutshell, Fibratus allows for gaining deep operational visibility into the Windows kernel but also processes running on top of it. It requires no drivers nor third-party software.

Events can be shipped to a wide array of output sinks or dumped to capture files for local inspection and forensics analysis. The powerful filtering engine permits drilling into the event flux entrails and the rules engine is capable of detecting stealthy adversary attacks and sophisticated threats.

You can use filaments to extend Fibratus with your own arsenal of tools and so leverage the power of the Python ecosystem

Quick start

  • Observe Microsoft Outlook attachments creating on the file system
fibratus run file.operation = 'create' and file.name icontains '\\Content.Outlook\\'
  • Hunt remote thread creations
fibratus run kevt.name = 'CreateThread' and kevt.pid != thread.pid
  • Record network interactions to the capture file
fibratus capture kevt.category = 'net' -o conns.kcap
  • Replay events from the capture
fibratus replay net.dport in (443, 80) -k conns.kcap
  • Run the filament for watching file system changes
fibratus run -f watch_files

Features

  • :zap: blazing fast
  • :satellite: collects a wide spectrum of kernel events - from process to network observability signals
  • :mag: super powerful filtering and rule engine
  • :snake: running Python scriptlets on top of kernel event flow
  • :minidisc: capturing event flux to kcap files and replaying anywhere
  • :rocket: transporting events to Elasticsearch, RabbitMQ or console sinks
  • :scissors: transforming kernel events
  • :dart: scanning malicious processes and files with Yara
  • :file_folder: PE (Portable Executable) introspection

Documentation


Setup

Events

Filters and Rules

Captures

Filaments

Outputs

Transformers

Alerts

PE (Portable Executable)

YARA

Troubleshooting


Developed with ❤️ by Nedim Šabić Šabić

Logo designed with ❤️ by Karina Slizova

FAQs

Package last updated on 31 Mar 2023

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc