Skip to main content
Mallory
Mallory

Intelligence You Can Afford to Act On

No hidden fees. No infrastructure to manage. Start investigating in minutes.

Starter

No sales call. Swipe a card, start investigating. Triage vulnerabilities, research threat actors, and run investigations with your own asset context from day one.

$499/mo

7-day free trial. No credit card required.

  • Tokens20M/mo
  • UsersUp to 3
  • AgentsUp to 10
  • Workspaces1 personal
  • SchedulesDaily recurrence
  • APIFull (starter rate limits)
  • Managed models
  • Full threat intelligence library
  • BYO asset context
Most Popular

Professional

One platform for your entire security team. Bring your own intel feeds, collaborate in shared workspaces, and schedule agents to monitor your attack surface hourly. Federated identity and team management keep everyone aligned.

$1,499/mo

$29.98/1M tokens

Let's scope your team's token volume.

  • Tokens50M/mo
  • UsersUnlimited
  • AgentsUnlimited
  • WorkspacesUnlimited
  • SchedulesHourly recurrence
  • APIFull (standard rate limits)

Everything in Starter, plus:

  • BYO intelligence feeds
  • Team management
  • Shared workspaces
  • Federated IAM (SSO/SCIM)
  • SLA guarantees
  • Audit logging

Enterprise

Your models, your deployment, your terms. Built for security organizations where compliance, custom infrastructure, and dedicated support are requirements, not nice-to-haves.

Custom/ yr

Custom deployment options. Typically live in a week.

  • TokensCustom
  • UsersUnlimited
  • AgentsUnlimited
  • WorkspacesUnlimited
  • SchedulesHourly recurrence
  • APIFull (dedicated rate limits)

Everything in Professional, plus:

  • BYO Model, or use Managed models with volume pricing
  • Dedicated support
  • Custom deployment

Community

Build with Mallory

Intelligence API access for builders and researchers. Build with your own agent framework (including Claude Code) and harness Mallory's intelligence data. Work or university email required.

Compare Plans

All the details, side by side.

FeatureCommunityStarterProfessionalEnterprise
Threat Intelligence Capabilities
Stories
Threat Intel (Actors, Advisories, Attack Patterns, Detection Signatures, Malware, TTPs, Evidence)
Vulnerability and Exposure Intel (Exploitations, Exploits, Products, Vulnerabilities)
Third Party Risk Intel (Breaches, Organizations)
Observables (IoCs)
APIIntelligence (community rate limits)Full (starter rate limits)Full (standard rate limits)Full (dedicated rate limits)
Contextualization Capabilities
ThreadsUnlimitedUnlimitedUnlimited
BYO asset context
BYO intelligence feeds
Automation Capabilities
ModelManagedManagedBYOM or Managed
Tokens/mo20M50M–150MCustom
Users3UnlimitedUnlimited
Agents10UnlimitedUnlimited
Workspaces1UnlimitedUnlimited
SchedulesDailyHourlyHourly
Platform Capabilities
SLA guarantees
Audit logging
Team management
Shared workspaces
Federated IAM (SSO/SCIM)
Dedicated support
Custom deployment

Frequently Asked Questions