Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
☆459Feb 19, 2026Updated last month
Alternatives and similar repositories for Malcolm
Users that are interested in Malcolm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- Helm charts for deploying Malcolm☆16Mar 18, 2026Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆32Mar 19, 2026Updated last week
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 2 months ago
- Zeek-Formatted Threat Intelligence Feeds☆392Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated 2 weeks ago
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Mar 3, 2026Updated 3 weeks ago
- A packet capture visualizer for industrial control networks.☆55Dec 4, 2023Updated 2 years ago
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated 2 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆794Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Jun 5, 2024Updated last year
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,327Mar 20, 2026Updated last week
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Digging Deeper....☆3,832Mar 20, 2026Updated last week
- Real-time, container-based file scanning at enterprise scale☆979Mar 19, 2026Updated last week
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆38Dec 11, 2024Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Jun 12, 2023Updated 2 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆189Aug 22, 2025Updated 7 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆88Jan 11, 2024Updated 2 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- AssemblyLine 4: File triage and malware analysis☆456Updated this week
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,932Feb 3, 2026Updated last month
- Dockerized Zeek☆12Mar 9, 2024Updated 2 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated last month
- A Low-cost ICS Security Testbed for Education and Research☆119Mar 16, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- Open Cyber Threat Intelligence Platform☆9,067Updated this week
- Initial triage of Windows Event logs☆106Jun 16, 2024Updated last year
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- Main Sigma Rule Repository☆10,224Mar 19, 2026Updated last week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,525Mar 19, 2026Updated last week