TECH FEATURES

Universal Ingestion Engine icon

πŸ”Œ Universal Ingestion Engine

Connect to any SIEM, server, cloud, identity provider, or security device. Ingest via API pull, webhook push, syslog, SFTP file pulls, cloud buckets, folder watchers, or bulk uploads.

Multi-Format Log Support icon

πŸ“„ Multi-Format Log Support

Parse and normalize JSON, NDJSON, CSV, Syslog, CEF, LEEF, Apache/Nginx formats, IIS W3C, and compressed bundles (ZIP/GZ) so hunts work across every environment.

Schema Normalization Layer icon

🧩 Schema Normalization Layer

All incoming logs convert into one hunting schema (time, host, user, IP, domain, URL, action, outcome, severity, confidence). This enables fast cross-source correlation without custom glue.

No-Code Field Mapping Wizard icon

πŸͺ„ No-Code Field Mapping Wizard

If a log format is unfamiliar, ZelKill opens a mapping wizard to bind fields to the ZelKill schema. Save mapping templates per integration and reuse them instantly.

High-Speed Search and Full-Text Indexing icon

πŸš€ High-Speed Search + Full-Text Indexing

Search millions of events with fast indexes and full-text search across command lines, URLs, domains, and scripts for instant investigation pivots.

Drag-and-Drop Hunt Builder icon

🧱 Drag-and-Drop Hunt Builder

Build hunts visually by dragging blocks into a pipeline: scope, filters, correlation, outputs, and actions. Validate, estimate, and run without writing queries.

Hunt Packs Library icon

πŸ“¦ 100+ Hunt Packs Library

A massive library of prebuilt hunts covering ransomware, brute force, web attacks, lateral movement, persistence, C2, exfiltration, identity abuse, and cloud threats. Load and run in one click.

ZelC Language Templates icon

🧾 ZelC Language Templates

Write intent-based ZelC scripts or choose from a large template library. Safety-check before execution, then run and produce evidence-linked outputs.

Correlation and Sequence Hunting icon

πŸ”— Correlation + Sequence Hunting

Correlate by host/user/IP/domain/hash within time windows and detect sequences (Event A then Event B) to rebuild real attack chains.

Rarity Mode and Baseline Compare icon

πŸ“Š Rarity Mode + Baseline Compare

Spot first-seen and low-prevalence entities instantly. Compare current activity against historical baselines to highlight true anomalies.

MITRE ATT&CK Mapping Engine icon

πŸ—ΊοΈ MITRE ATT&CK Mapping Engine

Auto-map observed behaviors to tactics and techniques, show activity heat, drill into technique evidence, and identify coverage gaps.

Ransomware War Room icon

🚨 Ransomware War Room

Dedicated ransomware workspace with patient zero ranking, spread mapping, phase timeline (Initial Access β†’ Impact), and containment recommendations.

Threat Graph Relationship Map icon

πŸ•ΈοΈ Threat Graph Relationship Map

Interactive entity relationship graph (IP ↔ host ↔ user ↔ domain ↔ process ↔ hash). Click nodes for pivots, evidence, and action recommendations.

Flow Map Intelligence icon

🧭 Flow Map Intelligence

From-to traffic flow diagrams that reveal who talked to what, where the data moved, and which paths look abnormal.

Event Timeline Command Center icon

πŸ•°οΈ Event Timeline Command Center

Hour/day/week timelines with swimlanes by host or user, phase overlays, fast filtering, and one-click conversion into case narratives.

AINA Intelligence Copilot icon

πŸ€– AINA Intelligence Copilot

Evidence-driven AI assistant that explains findings, suggests pivots, and drafts professional outputs. Every claim is tied to evidence IDs, never vague AI text.

AINA Fractures Specialized Modes icon

🧠 AINA Fractures (Specialized Modes)

Switch AINA into specialized modes like Threat Hunter, IOC Analyst, Ransomware Analyst, MITRE Mapper, Coverage Advisor, Executive Brief, and Remediation Planner.

Action Broker Orchestration icon

πŸ•ΉοΈ Action Broker Orchestration

Queue containment actions with approvals: block IPs/domains, isolate hosts, disable users, trigger playbooks, and track full audit trails.

100 Response Playbooks icon

πŸ“š 100 Response Playbooks

Built-in playbooks with step-by-step execution for ransomware, phishing, brute force, lateral movement, persistence, C2, exfiltration, and cloud incidents.

Evidence Locker with Hash Integrity icon

πŸ”’ Evidence Locker with Hash Integrity

Every evidence item is hashed (SHA-256), chained to custody logs, and exportable as evidence packs with manifests and integrity verification.

Case Management and Narrative Builder icon

πŸ—‚οΈ Case Management + Narrative Builder

Convert leads to cases, build timelines, attach evidence, assign tasks, track actions taken, and produce complete incident narratives.

Report Engine with Many Templates icon

🧾 Report Engine with Many Templates

Generate executive briefs, technical incident reports, IOC reports, MITRE reports, ransomware reports, hunt run summaries, and post-mortems with branded output.

Branded Report Shell with Verification Hashes icon

🏷️ Branded Report Shell + Verification Hashes

Reports include cover pages, headers/footers, classification labels, report IDs, and integrity hashes for defensible documentation.

Scheduled Hunts and Reports icon

⏱️ Scheduled Hunts + Scheduled Reports

Run hunts automatically on a schedule, generate leads/alerts by thresholds, and produce recurring security briefings without manual work.

Telemetry Health Dashboard icon

πŸ“ˆ Telemetry Health Dashboard

Monitor ingestion job health, parser errors, coverage gaps, and event volumes so you always know what data you have and what you’re missing.

Multi-Tenant Data Isolation icon

🏒 Multi-Tenant Data Isolation

Each user sees only their own events, hunts, cases, reports, evidence, and integrations, built for secure multi-user environments.

Role-Based Access Controls icon

πŸ” Role-Based Access Controls

Roles for Admin, Hunter, Analyst, Auditor, and Read-only ensure sensitive actions and exports are controlled and auditable.

Secure Secrets Storage icon

πŸ—οΈ Secure Secrets Storage

Integration tokens, webhook secrets, and AI keys are stored encrypted at rest with strict access controls and audit logging.

Zelfire Native Integrations icon

🧩 Zelfire Native Integrations

Deep native connectors for ZelAccess, ZelWall, ZelXDR, ZelSOAR, ZelScan, ZelMap, ZelPosture, Vulnerability Vines, ZelTester, ZelCloud, ZelDrift, ZelRank, ZelZero-Trust, and ZelExploits.

Enterprise-Grade Integrations Catalog icon

πŸ—‚οΈ Enterprise-Grade Integrations Catalog

A full integration catalog with guided configuration wizards for SIEMs, cloud logs, servers, network devices, proxies, DNS, identity providers, and email security logs.

↑