CybercentreCanada / assemblyline_client
Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4
☆23Updated last month
Alternatives and similar repositories for assemblyline_client:
Users that are interested in assemblyline_client are comparing it to the libraries listed below
- Valhalla API Client☆64Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆68Updated this week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- Web interface and APIs for Assemblyline 4☆19Updated this week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated 4 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- ☆77Updated 5 years ago
- A home for detection content developed by the delivr.to team☆64Updated last week
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- A CALDERA plugin☆25Updated 6 months ago
- Malware similarity platform with modularity in mind.☆76Updated 3 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆60Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 9 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated last week
- Various capabilities for static malware analysis.☆75Updated 4 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated 11 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- Easily create index of your SANS books☆15Updated 2 years ago
- ☆41Updated 9 months ago