Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆2,362Feb 19, 2026Updated last month
Alternatives and similar repositories for Malcolm
Users that are interested in Malcolm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆459Feb 19, 2026Updated last month
- Cybersecurity Evaluation Tool☆1,787Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated 2 months ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,327Updated this week
- Configuration files for the SOF-ELK VM☆1,724Jan 21, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- Digging Deeper....☆3,832Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,392Updated this week
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Your Everyday Threat Intelligence☆1,962Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Automated Adversary Emulation Platform☆6,831Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,723Sep 23, 2025Updated 6 months ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,525Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- Main Sigma Rule Repository☆10,224Mar 19, 2026Updated last week
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated 2 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- Real-time, container-based file scanning at enterprise scale☆979Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- Open Cyber Threat Intelligence Platform☆9,067Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,195Updated this week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,341Dec 13, 2022Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,505Mar 19, 2026Updated last week
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Mar 18, 2026Updated last week
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,064Oct 5, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- ☆2,392Oct 14, 2023Updated 2 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli …☆1,848Mar 28, 2022Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,175Jul 26, 2023Updated 2 years ago