Deep packet inspection and threat analysis platform for network forensics, threat hunting, and incident response. 67 protocol dissectors. Automated threat hunts. No cloud required.
From dashboard triage to deep packet inspection — a complete investigation workflow.
Dashboard — Risk scoring, traffic stats, protocol distribution, and top risk IPs at a glance
Deep Packet Inspection — Wireshark-quality packet analysis with display filters
Network Map — Interactive topology with OSINT lookup and risk scoring
Timeline — Kill-chain story mode with attack phase grouping and severity filtering
Investigation Graph — Living network visualization with attack chain detection
From initial triage through structured export, Intreys covers the full investigation lifecycle.
Wireshark-compatible display filters, full TCP/UDP stream reassembly, hex dump inspection, protocol tree dissection, and expert info panels. Virtual scrolling handles 500K+ packet lists.
C2 beacon detection, DNS tunneling, data exfiltration, lateral movement, port scanning, credential theft, and covert channel analysis. Hypothesis-driven hunts with playbook-guided investigation.
Attack narrative generation with Mermaid diagrams. Local AI analysis (runs on your hardware). Cloud providers supported with privacy controls and cost tracking.
10 industrial protocol dissectors including Modbus, DNP3, S7comm, IEC-104, and OPC UA. Security policy enforcement, dangerous operation detection, and per-host health scoring.
High-performance capture engine with real-time streaming. PCAP file writing for captured traffic. No external tools required.
Visual ATT&CK matrix with detected techniques. Pyramid of Pain indicator classification. ATT&CK Navigator JSON export for team collaboration.
STIX 2.1, MISP, TAXII 2.1, Sigma rules. PDF and DOCX reports. Full JSON and CSV export. YARA rule scanning on extracted artifacts.
Role-based access control, encrypted API key storage, login rate limiting, enterprise-grade security controls, audit logging, and cryptographically signed license verification.
Online enrichment via AbuseIPDB, VirusTotal, GreyNoise, OTX, Shodan, and URLScan. Threat feed ingestion with local caching for offline use. DGA detection.
No tshark, Wireshark, or Suricata required. Every dissector is built in with no external dependencies.
Start free. Scale when you need to.
Download the Community edition or clone from GitHub. No signup required.
Cross-platform (macOS, Linux, Windows) and Docker.
Pre-built packages available — no dependencies required.