Silence the unknown Oblivax

Open-source SOC powered by custom detection rules and deep threat emulation

About Us

What is Oblivax?

Oblivax is a next-generation security operations center (SOC) framework built on top of the open-source SELKS stack. While rooted in transparency and community-driven technology, Oblivax goes further by integrating a proprietary rule development program — Oblivax Forge — where advanced threats are recreated, analyzed, and transformed into precise detection mechanisms.

Open-source foundation

Built on the proven SELKS stack (Suricata, Elasticsearch, Logstash, Kibana, Scirius).

Custom rule development (Oblivax Forge)

In-house rules crafted through hands-on threat replication, traffic capture, and malware analysis.

Operational clarity

Whether you're a SOC analyst or an incident responder, our interface and rule logic are designed to reduce noise and highlight true threats.

Detection with context

Our rules are based on real-world behavior, not just static patterns.

Oblivax Forge

custom rule creation, redefined

What is Oblivax Forge?

Oblivax Forge is our internal engine for precision detection — a full-spectrum rule development pipeline that goes far beyond automated feeds. Through live threat emulation, traffic capture, reverse engineering, and behavioral analysis, we generate high-fidelity Suricata rules that identify what others overlook.

  • Step 1: Threat intelligence & CVE selection We start by identifying relevant vulnerabilities and attack methods from OSINT, CVE databases, exploit kits, and malware repositories.
  • Step 2: Controlled emulation Each threat is recreated in a sandbox environment to observe its behavior and payload delivery.
  • Step 3: Traffic capture & inspection We use tools like Wireshark, Zeek, and tcpdump to capture packet-level activity for forensic and signature analysis.
  • Step 4: Reverse engineering We deconstruct payloads, binaries, and scripts to locate unique strings, protocol anomalies, TLS patterns, or other signature-worthy elements.
  • Step 5: Rule drafting & tuning Rules are authored in Suricata syntax, then optimized to minimize noise, avoid redundancy, and trigger only under clear malicious conditions.
  • Step 6: Testing & validation Each rule undergoes replay testing in various environments to ensure accuracy and low false-positive rates.

Our mission

Our mission is to bridge the gap between open-source flexibility and enterprise-grade detection. We believe that defenders should have full visibility into their tooling, and that true detection capability comes from context-rich, tailored rule creation.

Built on battle-tested foundations Oblivax is built on top of the SELKS platform — an ecosystem of: - Suricata (IDS/IPS) - Elasticsearch - Logstash - Kibana - Scirius . This stack enables efficient network security monitoring and deep visibility. What sets Oblivax apart is how we extend this with in-house rule engineering through Oblivax Forge.

Rule example – CVE-2023-21990 (Java RCE)

alert http any any -> any any ( msg:"Oblivax Forge - CVE-2023-21990 RCE attempt"; flow:to_server, established; content:"POST"; http_method; content:"/vulnerable/endpoint"; http_uri; content:"rce_payload_marker"; http_client_body; sid:4100001; rev:1; )

  • This rule was created after fully reproducing the exploit in a lab and analyzing the resulting POST payload pattern.

Plans & Deployment

Check Our DEPLOYMENT OPTIONS

🧩 Modular Selection

Pick only what you need. Perfect for businesses that want to start small and expand later. custom pricing per module.

Request a quote

No credit card required

  • oblivax monitor
  • oblivax vulnerability scanning & reporting
  • oblivax ids/ips
  • oblivax forge (custom rules)

🖥 Deployment Options

Where do you want Oblivax to run? choose between full control or full management.

Request a quote

No credit card required

  • 🔹 On your infrastructure
  • (ISO / OVA image installation)
  • 🔹 On Oblivax managed servers
  • (plug-and-play, no maintenance required)

Frequently Asked Questions

everything you need to know about deploying oblivax

1. Can I start with a single module and expand later?

Absolutely. With Oblivax, you can start with a single module such as Oblivax Monitor, and add additional modules like Vulnerability Scanning & Reporting, IDS/IPS, or Oblivax Forge whenever your business requires them. The system is designed to be modular and scalable, ensuring that expansions are seamless and without the need for a complete system reinstallation.

2. What is the difference between on-premises deployment and managed hosting?

Oblivax offers two deployment models: On-Premises Deployment: You receive an ISO or OVA image to install directly on your own infrastructure. This option gives you complete control over your data, operations, and system customization. Managed Hosting: Oblivax deploys and manages your environment on our secure servers. You benefit from a plug-and-play setup, automatic updates, 24/7 monitoring, and no infrastructure maintenance responsibilities. Both options include full access to your monitoring dashboards and incident alerts.

3. Does the Complete Protection package include technical support?

Yes. The Complete Protection package comes with 24/7 premium technical support, including: Real-time incident response assistance Security tuning and onboarding sessions Ongoing system updates and rule optimizations Priority access to security analysts for custom investigations You also receive full access to the Oblivax Customer Dashboard, where you can track alerts, scans, incidents, and system performance in real time.

Oblivax Forge

custom rule creation, redefined
Oblivax Forge

What is Oblivax Forge?

Oblivax Forge is our precision-engineered rule creation pipeline. Unlike automated feeds, Forge relies on deep manual research, live attack emulation, traffic analysis, and reverse engineering to craft context-rich, high-fidelity Suricata detection rules that stop real threats — not just the obvious ones.

  • Track and analyze emerging CVEs, malware samples, and live exploit trends.
  • Recreate real-world attacks in controlled, secure sandbox environments.
  • Capture detailed network traffic using Wireshark, Zeek, and custom sniffers for forensic analysis.
  • Reverse engineer payloads, binaries, scripts, and protocols to extract meaningful indicators.
  • Draft Suricata rules focused on precision: minimal false positives, maximum context.
  • Validate every rule through rigorous replay testing against multiple real-world datasets and scenarios.

Oblivax Monitor

continuous threat monitoring, on your terms
Oblivax Monitor

What is Oblivax Monitor?

Oblivax Monitor is a fully managed, 24/7 detection and alerting service powered by the same advanced rule engine used internally by Oblivax. It provides real-time network monitoring, triage, and threat escalation, helping organizations stay ahead without being overwhelmed by false positives.

  • Real-time monitoring of Suricata alerts, correlating events with threat intelligence feeds.
  • First-level triage to distinguish real threats from noise, reducing the load on your internal team.
  • Verified threat escalation based on defined SLAs and event severity.
  • Weekly or daily reporting, providing summaries of detected threats and actionable recommendations.
  • Deployment via secure VPN or TLS-forwarded event streams; no permanent infrastructure access required.
  • Optional integration with customer SIEM, SOAR, or incident response playbooks.

Oblivax IDS/IPS

intelligent intrusion detection and prevention
Oblivax IDS/IPS

What is Oblivax IDS/IPS?

Oblivax IDS/IPS combines the proven power of Suricata with custom, real-world validated rules from Oblivax Forge, delivering smarter intrusion detection and active prevention tailored to modern threats.

  • Built on Suricata – the leading open-source IDS/IPS engine, battle-tested and trusted globally.
  • Enhanced with Oblivax Forge rules based on live threat emulation and malware reverse engineering.
  • Behavioral detection beyond static signature matching — identify anomalies and advanced attack patterns.
  • Full inspection of protocols: TLS, DNS, HTTP/HTTPS, and custom application layers.
  • Flexible deployment: ISO/OVA image for on-premises use or cloud-hosted plug-and-play setups.
  • Easy integration with existing SIEM, SOAR, or incident response workflows.

Oblivax

Vulnerability Scanning & Reporting
Oblivax Vulnerability Scanning & Reporting

What is Oblivax Vulnerability Scanning & Reporting?

Oblivax Vulnerability Scanning & Reporting helps organizations uncover weaknesses before attackers do. Through precision scanning and expert validation, we detect CVEs, misconfigurations, and insecure services, providing clear, prioritized remediation paths.

  • Comprehensive scanning of operating systems, services, web applications, and network devices.
  • Identification of known vulnerabilities (CVEs), default credentials, SSL/TLS misconfigurations, and insecure services.
  • Optional credentialed scans for deep system inspection and patch validation.
  • Context-aware threat classification and scoring, prioritizing real-world risk over generic CVSS scores.
  • Manual analyst verification of critical findings to reduce false positives and noise.
  • Clear, actionable reports delivered in PDF, dashboard view, or exportable formats for SIEM integration.

Ready to upgrade your detection?

Check Our Contact

Address

Splaiul Independenței 319, București 060044

Call Us

+40 0728 126 447

Loading
Your message has been sent. Thank you!