We Detect Hackers
Flexible and Continuous Compromise AssessmentsHave I been compromised?
With security breaches arising on multiple fronts, companies, healthcare systems, governmental and educational entities alike are starting to realize how real the threat of cyber security attacks are. In today’s world, firewalls, antivirus and network based intrusion prevention are not enough.
Compromise assessments are the most effective defense in depth measure an organization can use to ensure no threats have made it past their defenses.
Nextron Systems provides the best compromise assessment scanner and management platforms to facilitate a continuous assessment.
All our solutions can be used on your premises. Your data will never leave your network.


We Detect Hacker Activity
Our signature database with more than 17,000 hand crafted and high quality rules is focused on APTs (advanced persistent threats), their tool sets, scripts and malware.
We curate rules for hack tools, their output, config backdoors, RATs, web shells, suspicious system file replacements and traces of other malicious activity.
THOR is the perfect complement to your Antivirus solution.
Our Product Line
Detection, Management and AnalysisScanners
THOR is our full-featured, portable and flexible compromise assessment scanner for Windows, macOS and Linux systems.
THOR Lite is a feature-reduced version of THOR, which is bundled with the open source signature set of LOKI.
This mode of operation turns THOR into a RESTful web service that is able to process thousands of samples per minute sent from any device within the network.
THOR Cloud provides on-demand live forensic scans right at your fingertips.
Endpoint Agents
The AURORA Agent is a lightweight and customisable EDR agent based on Sigma. It uses Event Tracing for Windows (ETW) to recreate events that are very similar to the events generated by Microsoft’s Sysmon and applies Sigma rules and IOCs to them. Aurora complements the open Sigma standard with “response actions” that allow users to react to a Sigma match.
Management & Analysis
ASGARD Management Center allows you to configure, schedule and control scans on up to 25,000 end points per instance; It also features an IOC management as well as many response functions like file or memory collection and custom playbooks to run any tool or command on your endpoints.
ASGARD Analysis Cockpit collects scan logs, manages incidents in a role based cases management, creates filters and forwards messages to your SIEM or ticket management system.
Feeds
Supercharge your detection with more than 17,000 hand crafted, curated high quality YARA rules.
News
Blog Posts and TweetsRecent Blog Posts
Antivirus Event Analysis Cheat Sheet v1.12.0
We've updated our Antivirus Event Analysis Cheat Sheet to version 1.12.0. It includes updates in several sections New signatures for PUA like FRP and Adfind Signature strings...
Antivirus Event Analysis Cheat Sheet v1.11.0
We've updated our Antivirus Event Analysis Cheat Sheet to version 1.11.0. It includes updates in several sections add special identifiers for other hack tools and ransomware...
Extended ProxyNotShell Detection Covering OWASSRF
In a report published on the 20th of December CrowdStrike published a report of a new technique exploiting the Microsoft Exchange vulnerability called ProxyNotShell. The called...