Commit Graph

12 Commits

Author SHA1 Message Date
pandaadir05
74a6528c12 fix: use reqwest native-tls-vendored feature for musl 2025-11-21 16:00:51 +02:00
pandaadir05
bb6c2f926a Fix Windows compilation errors
- Added Win32_System_Kernel feature for CONTEXT structure support
- Added MemoryRead error variant to GhostError enum
- Fixed all MemoryReadError -> MemoryRead { message } conversions
- Fixed all ConfigurationError -> Configuration { message } conversions
- Added missing HashMap import in pe_parser.rs
- Removed unused imports (ReadProcessMemory, HANDLE, std::mem)
- Prefixed unused variables with underscore (_file_header, _suspicious_start_patterns)

This fixes all Windows build errors on CI/CD.
2025-11-21 14:47:38 +02:00
pandaadir05
2bcfcac407 Fix anomaly detection issues and add missing functionality
Fixed issues:
- Corrected Welford's online algorithm for variance calculation
- Added NaN and infinity guards to prevent invalid calculations
- Added Serialize/Deserialize traits to AnomalyScore and ProcessProfile

Added functionality:
- Profile persistence with save_profiles() and load_profiles()
- Global baseline computation from all process profiles
- Profile cleanup method to remove stale profiles
- Additional utility methods for profile management
2025-11-21 12:49:42 +02:00
pandaadir05
2a75438dde Implement real threat intelligence feed integration
Added actual HTTP-based feed fetching for:

- AbuseIPDB - IP address blacklist with confidence scoring
- MalwareBazaar - Recent malware samples with SHA256 hashes
- AlienVault OTX - Threat pulses with multiple IOC types

Each feed properly parses JSON responses, extracts indicators of
compromise (IOCs), caches them with appropriate TTLs, and maps
threat levels. Feeds require API keys and can be enabled/disabled
individually. IOC cache supports multiple indicator types including
IPs, file hashes, and filenames.
2025-11-21 01:10:04 +02:00
pandaadir05
449cfe9708 Enhance process hollowing detection with deep PE comparison
Added comprehensive section-by-section PE comparison that reads the
executable from disk, parses PE sections, and compares them against
memory using SHA-256 hashing. Detects:

- Modified code sections (>5% difference from disk)
- Missing PE sections in memory
- Section hash mismatches

This catches sophisticated hollowing techniques that modify specific
code sections while preserving the PE header structure.
2025-11-21 01:08:49 +02:00
Adir Shitrit
bcf934fac2 Add YARA dependency and implement rule compilation
- Added yara crate v0.28 to ghost-core dependencies
- Implemented real YARA rule compilation from .yar/.yara files
- Added recursive rule file discovery in rules directory
- Implemented memory scanning with compiled YARA rules
- Added proper error handling for rule compilation and scanning
- Cross-platform memory reading support (Windows, Linux, macOS stub)

Generated with [Claude Code](https://claude.com/claude-code)
2025-11-21 00:35:37 +02:00
pandaadir05
944a8f5e6e Fix Windows/macOS build errors - add Win32_UI feature and remove unused imports 2025-11-20 15:36:28 +02:00
pandaadir05
34007d11c1 fix: Resolve 44 compilation errors in ghost-core 2025-11-17 22:26:53 +02:00
pandaadir05
b1f098571d feat: Add PE header validation and LD_PRELOAD detection 2025-11-17 22:02:41 +02:00
Adir Shitrit
fe3e5e3b21 add configuration system with TOML support 2025-11-08 12:20:53 +02:00
Adir Shitrit
cd61b89eb5 update dependencies for async and serialization support 2025-11-08 11:47:46 +02:00
Adir Shitrit
8b55344d9b add ghost-core with basic process enumeration 2025-11-07 18:02:30 +02:00