Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you may focus on discovering vulnerabilities while we help you with the rest. Just use it in your terminal and get your work organized on the run.
Faraday was made to let you take advantage of the available tools in the community in a truly multiuser way. Faraday aggregates and normalizes the data you load, allowing exploring it into different visualizations that are useful to managers and analysts alike. To read about the latest features check out the release notes! The easiest way to get faraday up and running is using our docker-compose If you want to customize, you can find an example config over here Link You need to have a Postgres running first. You can find the installers on our releases page Add your user to the If you want to run directly from this repo, this is the recommended way: Check out our documentation for detailed information on how to install Faraday in all of our supported platforms For more information about the installation, check out our Installation Wiki. In your browser now you can go to http://localhost:5985 and login with "faraday" as username, and the password given by the installation process Learn about Faraday holistic approach and rethink vulnerability management. Setup Bandit and OWASP ZAP in your pipeline Setup Bandit, OWASP ZAP and SonarQube in your pipeline Faraday-cli is our command line client, providing easy access to the console tools, work in faraday directly from the terminal! This is a great way to automate scans, integrate it to CI/CD pipeline or just get metrics from a workspace Check our faraday-cli repo Check out the documentation here. Faraday Agents Dispatcher is a tool that gives Faraday the ability to run scanners or tools remotely from the platform and get the results. Connect you favorite tools through our plugins. Right now there are more than 80+ supported tools, among which you will find: Missing your favorite one? Create a Pull Request! There are two Plugin types: Console plugins which interpret the output of the tools you execute. Report plugins which allows you to import previously generated artifacts like XMLs, JSONs. Creating custom plugins is super easy, Read more about Plugins. You can access directly to our API,
check out the documentation here.$ wget https://raw.githubusercontent.com/infobyte/faraday/master/docker-compose.yaml
$ docker-compose up
$ docker run \
-v $HOME/.faraday:/home/faraday/.faraday \
-p 5985:5985 \
-e PGSQL_USER='postgres_user' \
-e PGSQL_HOST='postgres_ip' \
-e PGSQL_PASSWD='postgres_password' \
-e PGSQL_DBNAME='postgres_db_name' \
faradaysec/faraday:latest
$ pip3 install faradaysec
$ faraday-manage initdb
$ faraday-server
$ sudo apt install faraday-server_amd64.deb
# Add your user to the faraday group
$ faraday-manage initdb
$ sudo systemctl start faraday-server
faraday
group and then run$ pip3 install virtualenv
$ virtualenv faraday_venv
$ source faraday_venv/bin/activate
$ git clone git@github.com:infobyte/faraday.git
$ pip3 install .
$ faraday-manage initdb
$ faraday-server
$ pip3 install faraday-cli
$ faraday-cli tool run \"nmap www.exampledomain.com\"
💻 Processing Nmap command
Starting Nmap 7.80 ( https://nmap.org ) at 2021-02-22 14:13 -03
Nmap scan report for www.exampledomain.com (10.196.205.130)
Host is up (0.17s latency).
rDNS record for 10.196.205.130: 10.196.205.130.bc.example.com
Not shown: 996 filtered ports
PORT STATE SERVICE
80/tcp open http
443/tcp open https
2222/tcp open EtherNetIP-1
3306/tcp closed mysql
Nmap done: 1 IP address (1 host up) scanned in 11.12 seconds
⬆ Sending data to workspace: test
✔ Done
faraday-cli tool report burp.xml