Threat Intelligence,
Everywhere You Work
Integrate threat intelligence into your existing security workflows, log pipelines, and analysis tools.
Instant loading
<1ms lookups
Live reload
Apache 2.0
Scan your logs for indicators of compromise
# Quick start - match directly from CSV $matchy match threats.csv logs.txt | jq { "matched_text": "login.evil.com", "match_type": "pattern", "data": [{ "threat_level": "critical", "category": "phishing" }] } # Production - build database first $matchy build -o threats.mxy threats.csv --format csv ✓ Database built: threats.mxy
cargo install matchy