Skip to content
OpenCatalogcurated by FLOSSK

Browse & filter

Filter by platform, license text, maturity, maintenance cadence, and editorial tags like privacy-focused or self-hosted. Search matches names, summaries, tags, and use cases.

6 tools match your filters

Pattern matching for malware researchers—rules over files, memory, and streams in IR pipelines.

malwaredetectionthreat-huntingir

Network security monitor producing rich logs (conn, DNS, HTTP, SSL, files) for analytics—not a classic IDS signature engine.

nsmnetworksocthreat-huntinglogs

Generic signature format for SIEM/detection rules convertible to Splunk, Elastic, KQL, and many backends.

detectionsiemrulesthreat-huntingyaml

Rapidly search and hunt through Windows event logs (EVTX) using Sigma-like rules and built-in threat detections.

dfirwindowsevtxthreat-huntinglogs

Large-scale full packet capture, indexing, and search (SPIE) with a web UI—successor to the Moloch lineage for NSM teams.

nsmpcapsocthreat-huntingnetwork

Real Intelligence Threat Analytics: ingest Zeek logs to score beaconing, long connections, blacklisted DNS, and lateral patterns.

threat-huntingzeekbeaconingnetworkanalytics