AssemblyLine 4: File triage and malware analysis
☆456Mar 20, 2026Updated this week
Alternatives and similar repositories for assemblyline
Users that are interested in assemblyline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AssemblyLine4 documentation☆28Mar 6, 2026Updated 2 weeks ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Updated this week
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆48Updated this week
- Web interface and APIs for Assemblyline 4☆20Updated this week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Mar 19, 2026Updated last week
- Malware repository component for samples & static configuration with REST API interface.☆381Updated this week
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Feb 24, 2026Updated last month
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆117Mar 2, 2026Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆3,082Mar 18, 2026Updated last week
- Base service class from Assemblyline 4☆15Updated this week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,282Updated this week
- Real-time, container-based file scanning at enterprise scale☆979Mar 19, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆466Updated this week
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆119Mar 10, 2026Updated 2 weeks ago
- Transform Linux Audit logs for SIEM usage☆821Mar 5, 2026Updated 3 weeks ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆278Mar 14, 2026Updated last week
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆794Updated this week
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- A framework for orchestrating forensic collection, processing and data export☆345Mar 20, 2026Updated last week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,097Feb 25, 2026Updated last month
- Cobalt Strike Beacon configuration extractor and parser.☆159Oct 30, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆57Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,910Updated this week
- Windows kernel and user mode emulation.☆1,906Updated this week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆701Mar 12, 2026Updated 2 weeks ago
- High Octane Triage Analysis☆830Updated this week
- Digging Deeper....☆3,832Mar 20, 2026Updated last week