CybercentreCanada / assemblyline-baseLinks
Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)
☆69Updated this week
Alternatives and similar repositories for assemblyline-base
Users that are interested in assemblyline-base are comparing it to the libraries listed below
Sorting:
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆105Updated 2 months ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆115Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Digital Forensics Artifacts Knowledge Base☆83Updated last year
- Python library for threat intelligence☆87Updated 6 months ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated last month
- Cisco Orbital - Osquery queries by Talos☆134Updated 10 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Hatching Triage public command-line utility and API library.☆68Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Various capabilities for static malware analysis.☆78Updated 10 months ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- A guide on how to write fast and memory friendly YARA rules☆145Updated 5 months ago
- Valhalla API Client☆70Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated last month
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆105Updated this week
- Set of Yara rules for finding files using magics headers☆138Updated 4 years ago
- OSSEM Data Dictionaries☆61Updated 5 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- ☆69Updated 4 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year