Mallory
HomeBack to App
  • Welcome
  • User Guides
    • Getting Started
    • Concepts
  • Developer Guides
    • Source Monitoring
    • Vulnerability Intelligence
    • Vulnerability Inference
  • References
    • API Reference
    • MCP Server
Powered by GitBook
On this page
  • What to Expect
  • Understanding Key Concepts
  • Next Steps
  1. User Guides

Getting Started

Welcome to Mallory, a threat intelligence platform designed to help you stay ahead of emerging cybersecurity threats. Mallory is still in its early stages, but it already offers valuable features to support your threat intelligence needs. More capabilities are on the way!

What to Expect

At this stage, Mallory provides the following core features:

  • Current Events – A curated summary of the latest threats and vulnerabilities sourced from open intelligence.

  • Malware Family Intelligence - An encylopedia of known malware families and the circumstances of their discovery and usage.

  • Threat Actor Intelligence – An encyclopedia of known threat actors, their tactics, and related intelligence.

  • Vulnerability Intelligence – An encyclopedia of known vulnerabilities, including key insights and analysis.

We are actively developing additional features to enhance Mallory’s capabilities, so stay tuned for updates!

Understanding Key Concepts

To make the most of Mallory, it's helpful to understand the core concepts that power its intelligence capabilities. You can explore these in detail on the Concepts Page, but here’s a brief overview:

Foundational Concepts – Mallory ingests and processes Open Source Intelligence (OSINT) at scale, transforming vast amounts of publicly available information into actionable insights.

  • Sources – Data is collected from a variety of sources.

  • References - Each reference corresponds to a URL containing relevant intelligence.

  • Content Chunks - References have 1 or more content chunks, automatically analyzed for deeper context and insights about the entities discussed in the content

  • Entities – Entities such as malware, ransomware, threat actors, vulnerabilities, and organizations are identified within the data, continuously updated with the latest infomration

  • Mentions - Mentions tie Entities to References that mention them..

Next Steps

Now that you’re familiar with Mallory’s concepts at a highlevel , here’s what you can do next:

Last updated 19 days ago

Gain a deeper understanding of how Mallory operates under the hood in the section.

Check – Get the latest threat intelligence updates.

Browse the – Search for entities relevant to your needs.

Concepts
Current Events
Intelligence