{"payload":{"pageCount":4,"repositories":[{"type":"Public","name":"assemblyline-base","owner":"CybercentreCanada","isFork":false,"description":"Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":9,"issueCount":0,"starsCount":63,"forksCount":31,"license":"MIT License","participation":[2,10,3,12,13,4,13,9,19,23,20,22,23,14,22,14,14,4,12,1,11,11,26,15,16,11,15,11,1,7,5,11,11,21,10,31,14,23,21,7,18,8,13,3,4,7,35,10,3,6,5,8],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T19:45:52.135Z"}},{"type":"Public","name":"assemblyline-ui","owner":"CybercentreCanada","isFork":false,"description":"Web interface and APIs for Assemblyline 4","allTopics":["api","ui","socket-io","malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":5,"issueCount":0,"starsCount":18,"forksCount":18,"license":"MIT License","participation":[1,7,5,7,8,19,5,8,9,6,6,20,13,7,2,8,15,1,10,3,4,3,19,22,22,11,11,20,1,6,2,5,4,18,18,21,28,24,24,11,8,3,6,3,4,7,19,3,0,2,1,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T18:22:45.022Z"}},{"type":"Public","name":"assemblyline-service-urldownloader","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service that downloads seemingly malicious URLs","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":"MIT License","participation":[0,0,0,0,0,0,0,5,6,3,2,14,8,5,0,3,0,0,1,3,0,4,0,0,2,1,2,0,0,2,0,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T18:03:28.350Z"}},{"type":"Public","name":"assemblyline-service-document-preview","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Document preview service","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":[0,7,0,1,4,0,1,0,0,0,2,5,0,0,2,0,0,2,0,0,0,0,0,0,1,1,1,0,1,0,16,14,22,3,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:38.057Z"}},{"type":"Public","name":"assemblyline-service-urlcreator","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for creator URLs","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":[0,0,0,0,0,0,0,2,0,3,0,3,1,0,0,0,0,0,0,0,0,0,7,0,0,7,1,5,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,5,4,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:35.292Z"}},{"type":"Public","name":"assemblyline-service-onenote","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for OneNote Documents","allTopics":["malware-analysis","onenote","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:35.716Z"}},{"type":"Public","name":"assemblyline-service-ancestry","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 file geneology analysis service","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:35.606Z"}},{"type":"Public","name":"assemblyline-service-elfparser","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for Elfparser","allTopics":["elf","malware-analysis","elf-parser","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:35.645Z"}},{"type":"Public","name":"assemblyline-service-elf","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Executable and Linkable Format analysis service","allTopics":["elf","malware-analysis","elf-parser","lief","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,2,6,0,0,2,24,0,0,0,3,2,0,0,0,0,1,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:35.512Z"}},{"type":"Public","name":"assemblyline-service-batchdeobfuscator","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for Batch deobfuscator","allTopics":["batch","malware-analysis","assemblyline","batch-deobfuscator","batch-deobfuscation"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":[7,3,0,0,0,0,0,0,0,0,2,0,0,0,0,2,0,0,0,3,2,0,0,0,0,0,0,0,0,2,0,0,2,0,0,0,0,0,0,1,0,0,1,0,1,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:34.393Z"}},{"type":"Public","name":"assemblyline-service-martello","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 malicious PE file classification tool","allTopics":["dll","malware-analysis","exe","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:34.060Z"}},{"type":"Public","name":"assemblyline-service-capa","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service that leverage the CAPA open source tool","allTopics":["malware-analysis","assemblyline","capa"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:34.209Z"}},{"type":"Public","name":"assemblyline-service-apivector","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for ApiScout","allTopics":["malware-analysis","assemblyline","apiscout"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:34.977Z"}},{"type":"Public","name":"assemblyline-service-overpower","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 PowerShell emulation and static analysis tool","allTopics":["powershell","malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:32.052Z"}},{"type":"Public","name":"assemblyline-service-sigma","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Sigma service for Windows Event Log scanning","allTopics":["malware-analysis","sigma","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:32.724Z"}},{"type":"Public","name":"assemblyline-service-badlist","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for badlisting network and file features","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.899Z"}},{"type":"Public","name":"assemblyline-service-pe","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Portable Executable analysis service","allTopics":["dll","malware-analysis","exe","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.214Z"}},{"type":"Public","name":"assemblyline-service-jsjaws","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 JavaScript emulation and static analysis service","allTopics":["nodejs","javascript","html","malware-analysis","wscript","malware-jail","jscript","boxjs","assemblyline","gootloader"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":5,"issueCount":0,"starsCount":5,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.766Z"}},{"type":"Public","name":"assemblyline-service-safelist","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service for safelisting network and file indicators","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.843Z"}},{"type":"Public","name":"assemblyline-service-antivirus","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service that facilitates the dispatching and result parsing from multiple Anti-Virus products","allTopics":["antivirus","malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.773Z"}},{"type":"Public","name":"assemblyline-service-avclass","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service that extracts malware family and details from AV labels","allTopics":["malware-analysis","assemblyline","malpedia","avclass2"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":"MIT License","participation":[0,0,0,0,0,0,0,1,2,3,5,0,0,0,0,0,0,0,0,2,0,0,3,0,0,2,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.232Z"}},{"type":"Public","name":"assemblyline-service-metapeek","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Metadata anomaly detection service","allTopics":["metadata","malware-analysis","anomaly-detection","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.580Z"}},{"type":"Public","name":"assemblyline-service-characterize","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 metadata extraction and entropy calculation plugin","allTopics":["entropy","malware-analysis","shortcuts","lnk","metadata-extraction","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.764Z"}},{"type":"Public","name":"assemblyline-service-beaver","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Beaver API query service","allTopics":["malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:31.700Z"}},{"type":"Public","name":"assemblyline-service-virustotal","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service that queries/submits files to VirusTotal for analysis","allTopics":["query","malware-analysis","virustotal","submission","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:29.624Z"}},{"type":"Public","name":"assemblyline-service-intezer","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 service which fetchs the result of a specific SHA256 Intezer scan, or submits the file if the SHA256 does not already exist on Intezer.","allTopics":["malware-analysis","assemblyline","intezer"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":3,"license":"MIT License","participation":[0,2,0,2,0,2,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,2,0,0,1,1,4,0,0,0,0,0,0,0,0,0,0,0,0,0,0,4,0,0,0,4,1,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:28.410Z"}},{"type":"Public","name":"assemblyline-service-torrentslicer","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Torrent file metadata extractor","allTopics":["torrent","malware-analysis","metadata-extraction","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:28.314Z"}},{"type":"Public","name":"assemblyline-service-metadefender","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Metadefender API query service","allTopics":["antivirus","malware-analysis","assemblyline","metadefender"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:28.045Z"}},{"type":"Public","name":"assemblyline-service-XLMMacroDeobfuscator","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 XLM macro deobfuscator service","allTopics":["excel","macros","vba","malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:27.178Z"}},{"type":"Public","name":"assemblyline-service-configextractor","owner":"CybercentreCanada","isFork":false,"description":"Assemblyline 4 Malware Configuration Extractor service","allTopics":["configs","malware-analysis","assemblyline"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":3,"license":"MIT License","participation":[5,0,0,5,2,0,5,3,0,1,6,7,0,0,0,5,0,0,0,0,0,8,1,0,6,5,1,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,2,0,0,2,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-16T17:45:27.803Z"}}],"repositoryCount":117,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"CybercentreCanada repositories"}