LIGHTING THE UNKNOWN

Squey is an open-source visualization software designed to interactively explore and understand large amounts of tabular data.

validation

Assess data quality

Detect data discrepencies :
🗸 invalid rows
🗸 invalid, incoherent or missing values
chevron
lightbulb

Understand data structure

🗸 Combine visualizations
🗸 Observe frequencies
🗸 Reveal outliers
🗸 Link multiple datasets

chevron
anomaly

Discover paterns and anomalies

🗸 Conduct investigations
🗸 Validate hypothesis
🗸 Discard noise and detect weak signals

chevron
knowledge

Act with extra knowledge

🗸 Remediate incidents
🗸 Tune detection rules
🗸 Create training datasets
🗸 Export data subsets

cybersecurity
Cybersec
predictive maintenance
Predictive maintenance
detection
Fraud and risk detection
artifical intelligence
Machine learning
biomedical
Biomedical research
energy
Energy
plus
(and more)

parallel coordinates

Explore you datasets using complementary visualizations

Don't wait to test your hypothesis and get realtime feedbacks

filter

Narrow down your research perimeter while extracting key elements of your data

correlation

Reveal weak signals by discarding the noise

cpu

Use every bit of CPU, GPU and RAM available

python scripting console

Easily extensible with Python and plugins

See detailed Features

 

Latest Articles

IT & Cybersecurity Jun 25, 2024
Visualize AWS VPC Flow Logs in Squey using Apache Parquet format
Since version 5.0, Squey is able to import and export Apache Parquet files! « Apache Parquet is an open-source file...

Read more

IT & Cybersecurity Nov 21, 2023
Detect an SSH login after social engineering
In this article, we are addressing the challenge presented by detecteam.com. “We have published one year of ssh...

Read more

IT & Cybersecurity Sep 22, 2023
Phishing attack detection in proxy logs
Here is a video of the detection of a successful phishing attack contained in a 10 million rows anonymized proxy logs.

Read more

IT & Cybersecurity Aug 14, 2023
Filter PCAPs using complex criteria
You’re not sure what data your packet capture is really containing and it is too big to be opened with Wireshark...

Read more

IT & Cybersecurity Aug 11, 2023
PentesterAcademy MACCDC 2012 DNS Challenge
Following a really small and easy challenge published on PentesterAcademy blog focused on the MACCDC 2012 DNS dataset...

Read more

IT & Cybersecurity Aug 7, 2023
DFIR MONTEREY 2015 Network Forensics Challenge
This article aims at solving the PCAP related questions from the DFIR MONTEREY 2015 Network Forensics Challenge using...

Read more

IT & Cybersecurity Jul 29, 2023
Bluecoat Proxy Big Analysis
This article is a step-by-step tutorial aiming at loading and analyzing the bluecoat_proxy_big.zip dataset from Public...

Read more