nzyme - Close Access Denial
nzyme.org
nzyme - Close Access Denial
@nzyme.org
www.nzyme.org

EVERY WHISPER FINDS ITS ECHO
The new Nzyme - Close Access Denial phase of Ethernet processing gives you an overview of all assets in your network, with zero configuration, processing rules or queries.

1/3
June 14, 2025 at 11:09 PM
Coming in the next alpha release: Syslog and Webhook actions.

Actions are subscribed to System and Detection events like "Rogue Access Point detected" or "User MFA method has been reset".

As always, sensitive authentication information is transparently PGP encrypted in the Nzyme database.
June 4, 2025 at 3:43 AM
New in the Bluetooth subsystem: Additional device metadata detection/enrichment. Alert rules to follow.
April 25, 2025 at 1:26 AM
Coming in the next alpha release:

Out of the box Cursor-on-Target (CoT) messaging for integration with situational awareness products like the Team Awareness/Assault Kit (TAK/ATAK) and other coalition command and control systems.
March 25, 2025 at 3:37 AM
👀
February 23, 2025 at 1:47 AM
Now in active trials.
February 3, 2025 at 2:42 AM
New: Filters for WiFi BSSIDs and clients.
January 3, 2025 at 11:24 PM
Extremely early and full of issues, but the Rust ecosystem allowed us to quickly do a noisefloor calculation for a specified frequency, including a low-pass filter and some FFT.

Next: Find the noise floor using small frequency offsets around the target frequency in case it is in use.
November 30, 2024 at 12:16 AM
New in the next release: Improved database management for super administrators and organization administrators.
November 21, 2024 at 11:30 PM