
"It can be used by threat researchers and cybersecurity analysts to visualize relationships among domains, IP addresses, malicious files, and threat groups to identify patterns, attack paths, or hidden connections. Users can manually add node and edge data, import it from CSV files, or use REST API integrations. They can customize icons, backgrounds, node/edge types, and layouts."
""There are already software products that cover that space, and their makers can provide much better support and maintenance than I ever could," Fagerland said. "Quantickle is a different beast. Its purpose is to facilitate manual research, not automation; and to make detailed, customizable illustrations for visualization and publication. It aims at high-quality, curated relationships, and not massive hairball clusters.""
Quantickle is a browser-based network graph visualization tool created via vibe coding. The tool enables threat researchers and cybersecurity analysts to visualize relationships among domains, IP addresses, malicious files, and threat groups to identify patterns, attack paths, or hidden connections. Users can add nodes and edges manually, import CSVs, or integrate via REST APIs, and can customize icons, backgrounds, node/edge types, and layouts. The front end uses Cytoscape.js with a custom UI for rendering and layouts, while a lightweight Express server supplies UI assets, proxies integrations, and can optionally store graphs in Neo4j. Quantickle targets manual, curated research and is recommended to run locally rather than on remote servers.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]