The bottleneck of every Blue Team isn’t intelligence. It’s the time lost switching between tools.
The average SOC analyst uses between 6 and 12 different tools to investigate a single incident.
Opens VirusTotal, then Shodan, then AbuseIPDB, then TheHive to open the case, then Wazuh to view correlated alerts.
Gjallarhorn was built to end that problem. A single platform that centralizes investigation, analysis, forensics, and case management — with all the SOC integrations a Blue Team needs.
Everything a Blue Team analyst needs. In one place.
Every Gjallarhorn module exists because an analyst needed it in production. Not catalog features — real tools for real threats.
IOC Investigation
Enter an IP, domain, hash, or URL and Gjallarhorn crosses it in real time against 20+ threat intelligence sources: VirusTotal, Shodan, AbuseIPDB, AlienVault OTX, GreyNoise, Criminal IP, URLScan, and more. In seconds you get the consolidated score, each source’s verdict, and the team’s complete investigation history. What used to mean copying and pasting between tabs is now a single click.
Malware Analysis
Static analysis of suspicious files without executing them — zero contamination risk. Supports PE files (.exe, .dll, .sys), scripts (.ps1, .bat, .js, .vbs), Office documents, PDFs, and compressed archives. Detects known ransomware signatures, Cobalt Strike beacons, C2 frameworks, obfuscation techniques, and malicious behavior. Each analysis stored with SHA-256 hash, score, and verdict for future correlation.
Email Forensics
Drag in a .eml file and Gjallarhorn dissects it completely. Validates SPF, DKIM, and DMARC authentication. Extracts and analyzes all IOCs in headers, body, and attachments. Detects phishing patterns, BEC (Business Email Compromise), and social engineering. Traces the complete message path across relay servers. What used to take an expert analyst 30 minutes now takes seconds.
Case Management
Every security incident and finding managed in one place: opening, assignment, severity, status, and closure. Bidirectional sync with TheHive — cases created in Gjallarhorn appear automatically in TheHive, and vice versa. Classification by TLP (AMBER, RED, GREEN, WHITE), filters by status and severity, and complete lifecycle traceability for every incident.
Native SOC Integrations
Gjallarhorn connects with the tools you already use. TheHive for case management, Wazuh for SIEM and EDR, Velociraptor for live endpoint forensics, Nessus and OpenVAS for vulnerabilities. Configuration via API key — no additional agents, no complex setups. The dashboard shows the status of each integration in real time and consolidates all events in a unified view.
Automatic Correlation
When Wazuh detects a security event, Gjallarhorn automatically investigates the involved IOCs and — if the score exceeds the configured threshold — opens the case in TheHive without human intervention. The analyst arrives to find the incident already investigated, enriched, and classified. Not alerts to review: cases ready to act on.
Phishing Simulation
Native phishing campaign engine built directly into Gjallarhorn — no third-party wrappers. Create target groups, design custom HTML templates, launch rate-limited campaigns, and measure real user behavior: who opened, who clicked, who submitted credentials. Every event is logged with IP and timestamp in the team timeline, correlated with the IOC history.
WiFi Phishing Simulation
WiFi phishing campaigns against corporate networks with the Munin agent integrated in Gjallarhorn. Each simulation generates a unique pre-configured agent with the target SSID — the agent raises a fake portal, captures WiFi credentials in real time, and reports each event to the team. International access points, password capture, and per-session metrics. No agent reuse: each campaign, a new agent.
This is not a prototype. This is Gjallarhorn running in production.
Each screenshot shows the system operating with real data from active security investigations.
The full operation.
The dashboard consolidates all module activity in real time. The analyst arrives and already knows what happened, what’s happening, and what needs attention — without switching tools or losing context.
Every feature exists because an analyst needed it in a real investigation. No empty demos.
What used to mean copying and pasting between tabs is now a single click. What took 30 minutes takes seconds.
Static analysis: without executing the file, without contamination risk. Results in seconds.
No risk.
Static analysis doesn’t run the file — it dissects it. Detects malicious behavior, known signatures, and evasion techniques before the file reaches a production endpoint.
Reconnaissance starts weeks before the attack. Training has to start before the reconnaissance.
Customizable HTML templates with dynamic variables — name, company, role — for realistic awareness campaigns
to verdict.
Native engine built into Gjallarhorn — no third-party wrappers. From campaign design to analyzing who clicked and who submitted credentials, all in one place.
Corporate WiFi networks are attack surface. Munin turns them into a training ground.
WiFi phishing campaigns against corporate networks: SSID, template, status, captures, and drop rate — each simulation generates a unique Munin agent
Configurable fake portal, real-time WiFi credential capture, international access points, and session tied to the simulation — downloadable and non-reusable
Gjallarhorn grows with every real investigation
It’s not a finished platform — it’s a living system that incorporates new capabilities as AllSafe’s analysts need them in production.
v1.0 — Core SOC
JWT Auth + 2FA, RBAC (admin/analyst/viewer), IOC investigation, malware analysis, email forensics, case management, TheHive / Wazuh / Velociraptor / Nessus / OpenVAS integrations, automatic correlation, MITRE ATT&CK reports.
v1.1 — Phishing Simulation + WiFi
Native phishing engine integrated into Gjallarhorn: customizable HTML templates, credential capture landing pages, tracking pixel, post-campaign awareness emails, and full campaign lifecycle management. Includes WiFi Phishing Simulation with Munin agent for corporate networks.
v2.0 — AI Investigation Agent
AI investigation agent with ReAct reasoning (Ollama / Claude) that analyzes IOCs, proposes hypotheses, and executes investigation steps autonomously. Natural language investigation chat integrated into case context.
Not another layer on top of your tools. The layer that was missing.
Built by security analysts who got tired of losing time between tools that don’t talk to each other.
Integration, not replacement
Connects with TheHive, Wazuh, Velociraptor, and Nessus via API. It doesn’t replace your tools — it makes them work together for the first time.
Designed for real SOCs
Every feature exists because an AllSafe analyst needed it in a real investigation. No empty demos, no catalog features.
RBAC + 2FA from day one
JWT with TOTP two-factor authentication, role-based access control, and rate limiting. The security of the security tool is not optional.
Support from those who built it
You’re not buying a license and being left alone. The AllSafe team that developed Gjallarhorn supports you through implementation, configuration, and integration.
I want Gjallarhorn in my SOC
Fill out the form and an AllSafe specialist will contact you to evaluate your environment, demonstrate the platform in action, and design the implementation for your team.
