Entries
Blog Entries¶
That's right, we blog now! Check out our posts on Medium and articles written by our community!
-
Advent of Configuration Extraction
Published: December 2025
How does Sekoia use Assemblyline to automate extraction of malware configuration data?
Page 1 | Page 2 | Page 3 | Page 4
-
Crack any password-protected InnoSetup installer
Published: August 2024
Learn about InnoSetup and how we were able to automate cracking any related installer. -
What Can Assemblyline Learn From Other Malware Analysis Projects?
Published: March 2024
A deep dive on how Assemblyline compares to similar products and how could we improve the platform. -
The Great OneNote Scramble of 2023
Published: January 2024
See how fast we adapted Assemblyline in light of a malware campaign! -
What other security products WON’T tell you about malicious archives
Published: November 2023
See what how one attack chain lead to substantial improvements to Assemblyline and other open source projects! -
HackTheBox Business CTF 2023 Forensic Challenge
Published: October 2023
Can you use Assemblyline in a CTF?Let's find out!
-
Published: September 2023
See how well Assemblyline can perform without any dynamic analysis! -
Published: August 2023
Learn how Assemblyline came to be the powerful tool it is today. -
Supercharge Your Malware Analysis Workflow
Published: August 2023
Learn how you can use Assemblyline to automate your malware analysis!
Video Entries¶
That's right, we have videos too! Check out videos made by the community that showcase Assemblyline!
-
Supercharging Open Source Malware Analysis (Bitwarden)
-
Supercharge your malware analysis workflow (VirusBulletin)
-
Beginner Malware Analysis - Emotet Infection Chain (Invoke RE)
-
Automating Malware Triage (Invoke RE)
-
Technical session CyberShock (CERT.LV)
-
Introducing CSE’s open source AssemblyLine (Hackfest)
