Hiryu is a visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It can store mostly schemaless node and relation on local DB, and can use Neo4j GraphDB as backend. Quick Start: Requirements: Redis Neo4j (Optional): confirmed version 3.4.7 works Set up virtualenv and install python packages. Create Django Project and Install Hiryu: 1) Add 'Hiryu' to INSTALLED_APPS as follows: INSTALLED_APPS = [ ... 'Hiryu', ] 2) Edit DATABASES (e.g. postgresql) DATABASES = { 'default': { 'ENGINE': 'django.db.backends.postgresql_psycopg2', 'NAME': '<DB name>', 'USER': '<DB user>', 'PASSWORD': '<DB password>', } }
Common questions about Hiryu including features, pricing, alternatives, and user reviews.
Hiryu is A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC. It is a Threat Management solution designed to help security teams with Neo4j, Threat Analysis, Visualization.
Hiryu is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/S03D4-164/Hiryu/ for download and installation instructions.
Popular alternatives to Hiryu include:
Compare all Hiryu alternatives at https://cybersectools.com/alternatives/hiryu
Hiryu is for security teams and organizations that need Neo4j, Threat Analysis, Visualization, IOC, APT. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Head-to-head feature, pricing, and rating breakdowns.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Mobile-focused threat intelligence portal for detecting and analyzing mobile threats.