AssemblyLine4 documentation
☆28Feb 25, 2026Updated last week
Alternatives and similar repositories for assemblyline4_docs
Users that are interested in assemblyline4_docs are comparing it to the libraries listed below
Sorting:
- AssemblyLine 4: File triage and malware analysis☆448Feb 26, 2026Updated last week
- Base service class from Assemblyline 4☆15Updated this week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Feb 26, 2026Updated last week
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- Command line utility for copying files on NTFS using low level disk access☆39Mar 21, 2024Updated last year
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- A script to copy your Highlights from an Amazon Kindle device☆14Apr 27, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Custom Kdelive Effect Stacks for quick color correction and grading.☆14May 19, 2025Updated 9 months ago
- Mahjong solitaire as a browser game☆14Jan 26, 2024Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Easily bump $pkgver in your AUR packages.☆12Updated this week
- ☆12Jan 22, 2026Updated last month
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- GitHub Repository for the HW CWE SIG☆16Updated this week
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Simple project to test Elasticsearch with Django, build on docker.☆10Aug 16, 2020Updated 5 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- A JSON API to fetch Piped instances!☆12Feb 27, 2026Updated last week
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆10Jan 9, 2024Updated 2 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Cornerstone Image Loader for Web Images (PNG, JPEG) encoded base64 and implemented by typescript☆11Mar 13, 2019Updated 6 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Language bindings for vodozemac☆10Sep 5, 2024Updated last year
- ☆14Aug 18, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year