Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆2,380Apr 8, 2026Updated this week
Alternatives and similar repositories for Malcolm
Users that are interested in Malcolm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆460Apr 7, 2026Updated last week
- Cybersecurity Evaluation Tool☆1,805Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,347Updated this week
- Configuration files for the SOF-ELK VM☆1,729Jan 21, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- Digging Deeper....☆3,889Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,409Updated this week
- Re-play Security Events☆1,734Mar 20, 2024Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Your Everyday Threat Intelligence☆1,967Apr 6, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Automated Adversary Emulation Platform☆6,886Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- A repository of sysmon configuration modules☆3,016Aug 21, 2024Updated last year
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,561Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- Main Sigma Rule Repository☆10,309Apr 1, 2026Updated 2 weeks ago
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated last month
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- Real-time, container-based file scanning at enterprise scale☆981Mar 19, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Hunting ELK☆3,914Jun 1, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,231Updated this week
- Open Cyber Threat Intelligence Platform☆9,128Apr 8, 2026Updated last week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,344Dec 13, 2022Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,534Apr 8, 2026Updated last week
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated last week
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,069Oct 5, 2023Updated 2 years ago
- ☆2,397Oct 14, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,509Apr 1, 2026Updated last week
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,849Mar 28, 2022Updated 4 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Jul 26, 2023Updated 2 years ago