Raqhive - Network of Watchers
Lightweight eBPF IDS/IPS + Real-time AI Security Platform
Central Dashboard • Quick Start • Example Rules • Report Bug • Request Feature
| Real-time kernel visibility (exec • connect • open) | | Stateful correlation rules with instant hot-reload | | Optional automatic process kill (IPS mode) | | Central SIEM-like dashboard | | Live AI that instantly tells you: attack type • suspicious IPs/domains • tools used • exact actions to take |
- Pure eBPF kernel instrumentation (no kernel modules)
- Stateful detection (e.g., "alert if
/etc/shadowis opened → then outbound connection within 5 minutes") - YAML rule engine with automatic hot-reload
- IDS + optional IPS (auto-kill high-severity processes)
- Clean JSON alerts + separate IPS action log
- Central dashboard: https://log-manager-idsips.vercel.app
- AI based thread detection
├── Raqhive.c.c # eBPF program
├── raqhive.py # Main userspace controller
├── Raqhive_rules.yaml # Rule configuration (hot-reloadable)
├── send_logs.py # Upload logs to central dashboard
├── ids_alerts.log # IDS alerts (JSON lines)
└── ips_actions.log # IPS kill actions
1. Update system
sudo apt-get update2. Install required tools and kernel headers
sudo apt-get install -y build-essential python3-dev python3-pip \
linux-headers-$(uname -r) \
bpfcc-tools libbpfcc-dev3. Install Python dependencies
pip3 install --upgrade pip
pip3 install bcc pyyaml watchdog requests ipaddress4. (Optional) Verify bcc is working
python3 -c "from bcc import BPF; print('eBPF ready!')"-
Clone the repository
git clone https://github.com/Sazidul0/Raqhive.git cd raqhive -
Run Raqhive (requires root)
sudo python3 raqhive.py
You will see the following menu:
================================================== eBPF Professional IDS/IPS ================================================== 1. IDS Only (Monitoring) 2. IDS + IPS (Auto-kill HIGH severity) 3. Exit -------------------------------------------------- Choose 1/2/3:- Choose
1for Monitoring only. - Choose
2for Full IPS mode, which automatically terminates high-severity threats.
- Choose
Rules in
Raqhive_rules.yamlare reloaded automatically on change. PressCtrl+Cto stop the program.
- Navigate to https://log-manager-idsips.vercel.app and create a free account.
- Run the log uploader script:
python3 send_logs.py
- Enter your credentials when prompted. All alerts and IPS actions will be uploaded in real-time. You can then view, search, and manage alerts from all your hosts on the web dashboard.
This rule detects when a process accesses a sensitive file and then establishes an outbound network connection within a 5-minute window.
- name: "Potential Data Exfiltration"
description: "Process accessed sensitive file then connected outbound"
enabled: true
event: "connect"
severity: "high"
stateful:
source_event_match:
event: "open"
filename_regex: "^/etc/(shadow|passwd|sudoers)|/root/.ssh/id_rsa$"
time_window_seconds: 300 # 5 minutes| Component | Requirement |
|---|---|
| Kernel | Linux ≥ 5.4 (eBPF + BTF recommended) |
| Privileges | Root or CAP_BPF + CAP_SYS_ADMIN |
| Python | Python 3.8+ |
| Tested Distros | Ubuntu 22.04/24.04, Debian 12, Kali, Fedora |
- Linux servers & cloud VMs (Ubuntu, Debian, Rocky, etc.)
- Kubernetes nodes & container hosts
- Honeypots, exposed services, VPS, home labs
- Production environments needing real-time kernel visibility
- Compliance, audit, red/blue team exercises
- Any system running Linux kernel 5.4+ with root access
- Windows systems (no eBPF)
- macOS (limited & unstable eBPF support)
- Android / iOS devices
- Old kernels (< 5.4) without BTF
- Serverless / FaaS environments (no host kernel access)
- Embedded / IoT with locked-down or header-less kernels
- Air-gapped or highly restricted systems without CAP_BPF + headers
In short:
If it’s modern Linux and you have root - Raqhive is ready.
If it’s not Linux - look elsewhere (for now).
Raqhive is open-source and community-driven - we welcome contributions of all kinds!
Whether you're fixing a bug, adding new detection rules, improving the eBPF probe, enhancing the AI analysis, or just improving documentation - your help makes the entire ecosystem safer.
- 🐛 Report bugs or suspicious false positives
- ✨ Submit new detection rules (especially real-world attack patterns)
- 🛠️ Improve performance of the eBPF program
- 🤖 Enhance AI prompt logic or dashboard features
- Fork the repository
- Create a branch (
git checkout -b feature/amazing-detection) - Make your changes
- Test thoroughly (especially eBPF changes!)
- Submit a Pull Request with a clear description
This project is licensed under the MIT License - see the LICENSE file for details.
If Raqhive helped secure your systems, caught a threat, or saved you time -
please give it a star! Every star fuels development and helps others discover it.
One click makes a huge difference - thank you for being part of the hive!
Star • Fork • Report Issue • Contribute
A watched system is a secure system.
Thank you for watching with us.
