Purpose-built for malware analysts & CTI teams

From malware sample to analyst-ready report.

NoctiVox is a five-stage analysis pipeline. Drop in a malware sample or obfuscated payload and get back enriched IOCs, MITRE ATT&CK mappings, an infrastructure relationship graph, and an HTML/PDF report, in minutes, not days.

OSINT sources per IOC
6 async sources
ATT&CK technique rules
25+ deterministic

Currently onboarding a limited number of design partners. No credit card required.

noctivox-scribe · report-session-007
Pipeline output · sample data
naiss enrich --input sample.json | atta map | nexus build | scribe render
, NAISS output ,,,,,,,,,,,,,,,,,,
[NAISS] 185.220.101.14 MALICIOUS (0.91) AbuseIPDB · Feodo
[NAISS] update-cdn.net SUSPICIOUS (0.52) URLhaus · OTX
[NAISS] d41d8cd9…e9800998 MALICIOUS (0.88) MalwareBazaar
, ATTA output ,,,,,,,,,,,,,,,,,,
[ATTA] T1071.001 Application Layer Protocol × 3 IOCs
[ATTA] T1583.003 Acquire Infrastructure / VPS × 2 IOCs
, Nexus output ,,,,,,,,,,,,,,,,,
[NEXUS] Graph: 14 nodes · 9 edges · 2 clusters
Pivot: 185.220.101.14 (betweenness 0.72)
, Scribe output ,,,,,,,,,,,,,,,,,
[SCRIBE] report.html report.pdf report.md

Five-stage analysis pipeline

Each stage in the NoctiVox pipeline is a discrete, inspectable module. Run them end-to-end or invoke individual stages against data you already have.

Deobfuscator NAISS ATTA Nexus Scribe

Step 01

Deobfuscator

Entry point

Extracts IOCs from malware samples and obfuscated code. Accepts binaries, scripts, and packed payloads and outputs clean, normalized IOC lists.

  • Outputs IPs, domains, URLs, and file hashes
  • JSON and CSV export for downstream stages
  • Entry point for the full pipeline

Step 02

NAISS

Enrichment

Fans out each IOC across six OSINT sources in parallel, builds a 32-dimensional feature vector, and scores it against a self-improving FAISS malicious index.

  • AbuseIPDB, OTX, URLhaus, Feodo, MalwareBazaar, Shodan
  • Verdicts: clean <0.30 · suspicious 0.30–0.70 · malicious ≥0.70
  • Index persists to disk and grows with each run

Step 03

ATTA

ATT&CK mapping

Maps enriched IOCs to MITRE ATT&CK techniques using 25+ deterministic rules. No ML, every attribution is traceable to a source signal.

  • Rules cover Feodo C2, Tor exit nodes, Shodan port profiles
  • Outputs ATT&CK Navigator v4 layer JSON
  • Confidence-weighted technique scores per IOC

Step 04

Nexus

Graph analysis

Builds a directed relationship graph from IOC connections. Detects campaign clusters and pivot nodes using Louvain community detection and betweenness centrality.

  • Edges: domain→IP, URL→domain, IP→hash, and more
  • Interactive Pyvis HTML output + D3.js JSON + GraphML
  • Nodes sized by confidence; pivot nodes highlighted

Step 05

Scribe

Report generation

Consumes all upstream outputs and produces publication-ready HTML, PDF, and Markdown reports with embedded charts, IOC tables, and ATT&CK coverage maps.

  • Jinja2 templates + WeasyPrint PDF rendering
  • Sections: Executive Summary, OSINT Coverage, ATT&CK Map, Infra Graph
  • --analyst, --classification, --title flags

A pipeline you can run today

Each tool in the NoctiVox pipeline is a standalone Python module. Run the full chain end-to-end or call individual stages against data at any point in your workflow.

  • 1. Extract, Deobfuscator

    Feed in a malware sample or obfuscated script. Deobfuscator extracts all embedded IOCs, IPs, domains, URLs, file hashes, and normalizes them to JSON or CSV for the next stage.

  • 2. Enrich & score, NAISS

    Each IOC is fanned out asynchronously to six OSINT sources. NAISS builds a 32-dimensional feature vector per IOC and scores it with FAISS similarity against a growing malicious index. Verdict: clean, suspicious, or malicious.

  • 3. Map, ATTA (parallel)

    ATTA ingests the NAISS report and applies 25+ deterministic rules to assign MITRE ATT&CK techniques to each IOC. Outputs a Navigator v4 layer and structured JSON/CSV. Runs in parallel with Nexus.

  • 4. Graph, Nexus (parallel)

    Nexus builds a directed infrastructure graph from IOC relationships, detects campaign clusters via Louvain community detection, and identifies pivot nodes by betweenness centrality.

  • 5. Report, Scribe

    Scribe merges all upstream outputs and generates publication-ready HTML, PDF, and Markdown. Includes executive summary, IOC table, ATT&CK heatmap, and infrastructure map.

Design partner program

As a relatively new startup, we're working closely with a small number of security teams to shape the roadmap.

  • Direct access to product & security engineering
  • Influence integrations, data model, and reporting
  • Preferential pricing as a founding customer
Apply for design partnership

See NoctiVox in a Live Walkthrough

Instead of a canned video, we run interactive live walkthroughs. You bring a sample, a YARA hit, or a list of suspicious indicators. We show you what the pipeline produces against real data.

What we typically cover in 30 minutes

  1. Pipeline walkthrough: drop a sample or IOC list into Deobfuscator and walk the output through NAISS, ATTA, Nexus, and Scribe, live, against real data.
  2. Report output review: examine a completed HTML/PDF report, IOC table, ATT&CK Navigator layer, infrastructure graph, and executive summary, and discuss how to customize sections for your audience.
  3. Verdict calibration: review NAISS confidence scoring, FAISS index behavior, and ATTA rule logic; discuss tuning thresholds for your threat environment.
Discuss pricing & next steps

We'll follow up with a short questionnaire so we can tailor the demo to your environment.

What early users are saying

We're actively incorporating feedback from security leaders and hands-on defenders.

Head of Security Operations

European telecom · Design partner

SOC

Threat Intelligence Lead

Financial services · Pilot project

CTI

Simple, transparent pricing

Early customers get access to our founding pricing, with room to grow as your intel program matures.

Starter

$99/month

Teams starting to run structured malware analysis and build threat intelligence reports.

  • Full Deobfuscator + NAISS pipeline (up to 500 IOCs/month)
  • ATTA ATT&CK mapping included
  • HTML & Markdown report output
  • Email support
FOUNDING PLAN

Professional

$499/month

Malware analysts & CTI teams running regular sample analysis workflows.

  • Unlimited IOC processing per month
  • Full pipeline: Deobfuscator → NAISS → ATTA → Nexus → Scribe
  • PDF report output + all export formats
  • FAISS index persistence and cross-run similarity growth
  • Priority support & roadmap input

Enterprise

Custom

For organizations with highly regulated or complex environments.

  • All Professional features
  • Private FAISS index hosting + custom retention
  • Dedicated onboarding & analyst training
  • 24/7 support (SLA)

Ready to test NoctiVox in your environment?

Share a real-world scenario, a recent malware sample, suspicious domain cluster, or YARA hit. We'll use your data to run a live pipeline demonstration.

We're a security-first startup: NDAs and data handling requirements are welcome.