Pulsar is a security tool for monitoring the activity of Linux devices at runtime, powered by eBPF.
The Pulsar core modules use eBPF probes to collect events from the kernel in a safe and efficient way. Pulsar events can be categorized in the four main following areas:
- Processes: processes information, including file execution and file opening.
- File I/O: I/O operations on disk and memory.
- Network: data from the network stack.
Pulsar is built with a modular design that makes it easy to adapt the core architecture to new use cases, create new modules or write custom rules.
Warning
A kernel 5.5 or higher with BPF and BTF enabled is required. Visit the official Pulsar website for the full requirements and installation options available.
To download and install Pulsar, run the following in your terminal:
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/exein-io/pulsar/releases/latest/download/pulsar-install.sh | sh
Launch the pulsar daemon in a terminal with administrator privileges:
pulsard
That's pretty much it. At this point Pulsar is actively monitoring the activity of all the target processes, and checking it against the set of security policies defined in the rules file. You can test this by triggering a threat event, for example running the following command in another terminal:
ln -s /etc/shadow /tmp/secret
In the pulsar terminal you should see something similar to:
[2023-02-07T14:29:09Z THREAT /usr/bin/ln (36267)] [rules-engine - { rule_name = "Create sensitive files symlink" }] File Link { source: /tmp/secret, destination: /etc/shadow, hard_link: false }
As you can see Pulsar identifies the previous command as a threat event.
Behind the scenes, when an application performs an operation, it gets intercepted at kernel level by the Pulsar BPF probes, turned into a unique event object and sent to the userspace. There, the Pulsar rule engine processes the event against the set of rules defined in the rules file and, if there is a match, it emits a new event, marked as a threat. Finally a logger module prints threat events to the terminal.
In the example above, the event produced matched the following rule:
- name: Create sensitive files symlink
type: FileLink
condition: (payload.destination IN ["/etc/shadow", "/etc/sudoers", "/etc/pam.conf", "/etc/security/pwquality.conf"] OR payload.destination STARTS_WITH "/etc/sudoers.d/" OR payload.destination STARTS_WITH "/etc/pam.d") AND payload.hard_link == "false"
The recommended approach to getting started with Pulsar is by using the official installations script. Follow the guide in the Quickstart section.
Another approach to install Pulsar is by using a pre-built binary. Binaries are available for the latest release. Use pulsar-exec
for x86-64 (pulsar-exec-static
for a static build) or pulsar-exec-static-aarch64
for AArch64 platform. Using there approach you also need to download and setup the helper scripts to have a more convenient way to start in daemon/cli mode.
We do not recommend build Pulsar from source. Building from source is only necessary if you wish to make modifications. If you want to play with the source code check the Developers section of the documentation.
- Read the docs: understand how to install and set up Pulsar.
- Concepts: dive deep into Pulsar architecture and main concepts.
- Tutorials: learn how to use Pulsar with practical examples.
- Develop new eBPF modules: build new eBPF probes and integrate them into Pulsar through the modules system;
- Roadmap: check out the plan for next Pulsar releases;
- Support: join the Discord server for community support.
If you're interested in contributing to Pulsar — thank you!
We have a contributing guide which will help you getting involved in the project. Also check the Developers section of the documentation for more information on Pulsar development.
Join the Pulsar Discord server to chat with developers, maintainers, and the whole community. You can also drop any question about Pulsar on the official GitHub discussions or use the GitHub issues for feature requests and bug reports.
Pulsar is licensed under two licenses — Pulsar userspace code is licensed under APACHE-2.0. Pulsar eBPF probes are licensed under GPL-2.0.