CybercentreCanada / assemblyline4_docsLinks
AssemblyLine4 documentation
☆29Updated 2 weeks ago
Alternatives and similar repositories for assemblyline4_docs
Users that are interested in assemblyline4_docs are comparing it to the libraries listed below
Sorting:
- AssemblyLine 4: File triage and malware analysis☆336Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- The Sigma command line interface based on pySigma☆157Updated 3 months ago
- Malware repository component for samples & static configuration with REST API interface.☆362Updated 3 weeks ago
- Collection of Jupyter Notebooks by @fr0gger_☆172Updated last month
- A framework for orchestrating forensic collection, processing and data export☆325Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆228Updated last week
- Sigma rules from Joe Security☆217Updated 8 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆219Updated 3 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- ☆207Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆152Updated 4 months ago
- A python script developed to process Windows memory images based on triage type.☆263Updated last year
- DFIQ is a collection of investigative questions and the approaches for answering them☆286Updated 6 months ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆291Updated 2 months ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated this week
- Sigma rule specification☆139Updated last week
- A (nearly) production ready Dockered MISP☆232Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆105Updated 2 months ago
- Rules generated from our investigations.☆196Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆135Updated last year
- STIX2 graph visualisation library in JS☆90Updated 3 weeks ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆315Updated 9 months ago
- Threat Hunting & Incident Investigation with Osquery☆212Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆114Updated 3 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Intelligence Architecture Mind Map☆131Updated last year
- Swagger/ OpenAPI specifications for security products and services☆78Updated 3 weeks ago
- User guide of MISP☆272Updated 6 months ago