AssemblyLine 4: File triage and malware analysis
☆464Apr 7, 2026Updated last week
Alternatives and similar repositories for assemblyline
Users that are interested in assemblyline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AssemblyLine4 documentation☆28Updated this week
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Updated this week
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆48Apr 9, 2026Updated last week
- Web interface and APIs for Assemblyline 4☆21Apr 8, 2026Updated last week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Apr 7, 2026Updated last week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Apr 1, 2026Updated 2 weeks ago
- Malware repository component for samples & static configuration with REST API interface.☆383Apr 8, 2026Updated last week
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Feb 24, 2026Updated last month
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆119Mar 2, 2026Updated last month
- Malware Configuration And Payload Extraction☆3,117Updated this week
- Base service class from Assemblyline 4☆15Apr 9, 2026Updated last week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,287Apr 7, 2026Updated last week
- Real-time, container-based file scanning at enterprise scale☆983Mar 19, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 11 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆466Apr 9, 2026Updated last week
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆119Mar 10, 2026Updated last month
- Transform Linux Audit logs for SIEM usage☆824Mar 5, 2026Updated last month
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆280Updated this week
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Apr 6, 2026Updated last week
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- A framework for orchestrating forensic collection, processing and data export☆345Apr 7, 2026Updated last week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆36Feb 2, 2022Updated 4 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,098Feb 25, 2026Updated last month
- Cobalt Strike Beacon configuration extractor and parser.☆161Oct 30, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Apr 8, 2026Updated last week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆129Sep 24, 2023Updated 2 years ago
- Windows kernel and user mode emulation.☆1,933Apr 8, 2026Updated last week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆704Apr 1, 2026Updated 2 weeks ago
- Digging Deeper....☆3,889Apr 8, 2026Updated last week
- Forensics artefact collection tool for systems running Microsoft Windows☆434Mar 26, 2025Updated last year
- High Octane Triage Analysis☆841Apr 7, 2026Updated last week