CybercentreCanada / assemblyline-coreView external linksLinks
Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
☆21Updated this week
Alternatives and similar repositories for assemblyline-core
Users that are interested in assemblyline-core are comparing it to the libraries listed below
Sorting:
- Web interface and APIs for Assemblyline 4☆20Updated this week
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Updated this week
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Dec 18, 2025Updated last month
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Feb 6, 2026Updated last week
- ☆13Jan 27, 2024Updated 2 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Apr 6, 2019Updated 6 years ago
- Java bytecode virus proof of concept (jarfile self-replication)☆17Jun 9, 2023Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- AssemblyLine 4: File triage and malware analysis☆421Updated this week
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Feb 8, 2026Updated last week
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 8 months ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- ☆30Mar 3, 2021Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- AssemblyLine4 documentation☆28Jan 30, 2026Updated 2 weeks ago
- 一款记录任务时间的时间管理应用☆15Dec 29, 2025Updated last month
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆22Updated this week
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 2 months ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated 2 weeks ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- A friendly orchestrator platform from the future☆16Updated this week