Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)
☆21Feb 26, 2026Updated last week
Alternatives and similar repositories for assemblyline-core
Users that are interested in assemblyline-core are comparing it to the libraries listed below
Sorting:
- Web interface and APIs for Assemblyline 4☆20Updated this week
- Base service class from Assemblyline 4☆15Updated this week
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Feb 24, 2026Updated last week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Updated this week
- ☆13Jan 27, 2024Updated 2 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Apr 6, 2019Updated 6 years ago
- Java bytecode virus proof of concept (jarfile self-replication)☆17Jun 9, 2023Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 9 months ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- Converts an ELF binary to a JSON representation☆34Sep 3, 2015Updated 10 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- ☆30Mar 3, 2021Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- 一款记录任务时间的时间管理应用☆17Feb 27, 2026Updated last week
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A friendly orchestrator platform from the future☆17Feb 27, 2026Updated last week
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆27Updated this week
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 5 months ago