Access a comprehensive library of 80+ pre-built detection rules for malware, phishing, APTs, and advanced threats. Our rules continuously monitor the entire web infrastructure, analyzing billions of data points across domains, certificates, network traffic, and digital assets to identify emerging threats in real-time.
Comprehensive rules for detecting malware families, ransomware, trojans, and other malicious software across multiple attack vectors and delivery methods.
Advanced rules for identifying phishing campaigns, credential harvesting, and social engineering attacks targeting your organization and users.
Sophisticated rules for detecting Advanced Persistent Threats, nation-state actors, and long-term targeted attacks against your infrastructure.
Rules for detecting unusual network traffic patterns, lateral movement, data exfiltration, and other suspicious network activities.
Specialized rules for detecting brand impersonation, domain spoofing, and unauthorized use of your organization's intellectual property.
Detection rules for mobile-specific threats including malicious apps, SMS phishing, and mobile device compromise indicators.
Our detection rules continuously monitor the entire web infrastructure, analyzing billions of data points across domains, certificates, network traffic, and digital assets to identify emerging threats and security vulnerabilities in real-time.
Build custom detection rules with our powerful Python SDK designed for security analysts and threat hunters
Built by security analysts for security analysts. Our SDK provides a clean, intuitive Python interface that makes creating custom detection rules simple and efficient.
Get up and running in minutes with our comprehensive detection categories and pre-built templates. Focus on threat hunting, not infrastructure setup.
Create new detection rules in minutes with our simple Python framework. Each detection type has its own directory with specific queries that can be executed independently or integrated into your security workflows.
Get started with Webamon SDK in minutes. Choose your preferred installation method and start building custom detection rules.
Install via pip for the most up-to-date version with full feature support and automatic updates.
Clone from GitHub and install from source for development or custom builds.
Seamlessly integrate with threat intelligence platforms and receive real-time notifications
Automatically share detection results and threat indicators with MISP (Malware Information Sharing Platform) for collaborative threat intelligence and community-driven security.
Connect with OpenCTI for advanced threat intelligence management, knowledge graphs, and automated threat analysis workflows.
Stay informed instantly when threats are detected with flexible notification options that integrate seamlessly into your existing security workflows and communication channels.
Receive real-time HTTP POST notifications to your custom endpoints when detections occur. Perfect for integrating with SIEMs, SOAR platforms, and custom security tools.
Get detailed email alerts with threat summaries, affected assets, and recommended actions. Customize frequency, severity filters, and recipient groups.
Access our comprehensive detection library and strengthen your security posture with proven, up-to-date detection rules. Deploy them across your infrastructure in minutes.