Translations:
![Logo](./Misc/logo_transparent.png)
An AI antivirus written in Rust
🧪 Access training data · 📖 Read the technical doc · 💬 Request Feature
Owlyshield is an open-source AI-driven antivirus engine written in Rust. Static analysis as performed by AV is only able to detect known threats, explaining why hackers are adapting so quickly and ransom attacks surging. We provide an embedded behavioural analysis AI that is able to detect and kill ransomwares in their very early execution.
We have put a lot of efforts into making the application fast, through multithreading and machine learning algorithms like random forests, which are quick to compute.
We at SitinCloud 🇫🇷 strongly believe that cybersecurity products should always be open-source:
- In addition to the source code, we provide a complete wiki and code documentation,
- Open-source products can be considered as sovereign solutions because there is no risk of any foreign agency introducing hidden backdoor or mass surveillance features users may not be aware of,
- We provide specific entrypoints in the code to make interfacing with third-party tools easy (specifically SIEM and EDRs).
We regularly release installers (in the Releases GitHub section). The Free Edition (community edition) is fully operational and will efficiently protect your system against ransomwares. You no longer have to start Windows in test-signing mode as we now provide the signed driver in the community version.
Please refer to the Wiki for usage instructions or if you prefer to build it yourself. Suggestions are welcome (see Contributing).
See the open issues for a full list of proposed features (and known issues).
The Pro Edition (commercial edition) adds the following features:
- A webapp gathering all incidents data to help IT staff to understand the scope of the attack within the company networks and act accordingly (or classify it as a false positive),
- Interfaces with your log management tools (we even provide an API),
- Scheduled tasks to auto-update the application.
Within the frame of the free version usage we will do our best to help you finding a solution for any GitHub Issue you may rise.
Issues that subscribers to our commercial version or valued added resellers may rise will of course be handled in priority.
Although commercial products or services can be directly purchased from us (feel free to contact us directly for any quotation that could suit your need), we think that our products should be distributed to end customer in an indirect way.
Please contact us:
- If you want to become a distribution partner or use our products as an MSSP: we are opened to such kind of partnerships,
- If you want to integrate Owlyshield as part of your own EDR / XDR system: we will be pleased to issue the best proposal for appropriate level of professional services to do so,
- If you need to protect your critical enterprise servers against crafted attacks or progressive wipers: we can introduce you with our brand new novelty detection engine based on encoders AI tools (Owlyshield Enterprise Edition),
- For any question or a presentation of our products.
- A minifilter (a file system filter driver) intercepts I/O request packets (IRPs) to collect metadata about what happens on the disks (DriverMsg in the sources),
- Owlyshield-predict uses the previously created DriverMsgs to compute features submitted to a RNN (a special type of neural network wich works on sequences). Behavioural as well as static analysis are performed.
- If the RNN predicts a malware, owlyshield-predict asks the minifilter to kill the malicious processes and send a very detailed report about what happened to your SIEM tools (and/or a local file).
The model was trained with malwares from the real world collected from very diverse places on the internet (dark web, by sharing with researchers, analysis of thousands of downloads with virustotal).
We ran them on Windows VMs with Owlyshield working in a specific mode (--features record
) to save the IRPs. *
Owlyshield-predict* with --features replay
was then used to write the learning dataset (a csv file).
The Malwares-ML repository is the place where we share some of our learning datasets.
We help our contributors by providing them with a free access to Owlyshield Pro Edition.
If you discover any undetected ransomware please do open an issue with the tag "undetected". It will help us improve the AI engine and understand what new trick has been implemented in order not to be detected.
If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an Issue with the tag "enhancement". Don't forget to give the project a ⭐! Thanks again!
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
Distributed under the EUPL v1.2 license. See LICENSE.txt
for more information.
Damien LESCOS - @DamienLescos
Project Link: https://github.com/SitinCloud/Owlyshield/
Company Link: SitinCloud