A malware communication analyzer that visualizes network traffic and cross-references it with known malware sources.
Malcom is a malware communication analyzer that visualizes network traffic patterns and cross-references them with known malicious sources. It helps security analysts detect command and control servers, understand peer-to-peer malware networks, and identify DNS fast-flux infrastructures. The tool converts raw network data into actionable intelligence through interactive graphs and database lookups.
Security analysts, malware researchers, and incident responders who need to analyze network communications from potentially infected systems. It's particularly useful for those investigating advanced persistent threats (APTs) and botnet activities.
Malcom provides faster malware analysis through visual representations of network traffic, eliminating the need to manually parse packet captures. Its open-source nature allows customization with custom threat feeds, and the Docker deployment makes it easy to set up in isolated analysis environments.
Malcom - Malware Communications Analyzer
Allows adding custom feeds via straightforward scripts, enabling integration with proprietary or updated threat databases, as detailed in the wiki tutorial.
Uses D3.js force-directed graphs to provide intuitive, human-readable representations of malware communication patterns, accelerating forensic analysis.
Offers a Docker image for quick setup, reducing installation complexity for users familiar with containerization, as noted in the README.
Covers key malware communication aspects like C&C server detection, P2P network analysis, and DNS fast-flux observation, making it a versatile tool.
Requires installing multiple dependencies (MongoDB, Redis, Scapy, etc.), manual configuration, and downloading external databases like Maxmind, which is time-consuming.
The README disclaimer warns of potential security gaps, need for root privileges for TLS interception, and it's not recommended for production due to reliability issues.
Explicitly stated to not be ultra-fast or handle huge datasets easily, as it's written in Python and not optimized for high-throughput scenarios.
Malicious traffic detection system
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
ngrep is like GNU grep applied to the network layer. It's a PCAP-based tool that allows you to specify an extended regular or hexadecimal expression to match against data payloads of packets. It understands many kinds of protocols, including IPv4/6, TCP, UDP, ICMPv4/6, IGMP and Raw, across a wide variety of interface types, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.