From 44fc3c45941550dc1345e79ee174dd4bc218cfa9 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Sun, 29 Dec 2019 16:34:29 +0530 Subject: [PATCH] Mark another URL dead --- README.md | 2 +- run_awesome_bot.sh | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e538e55..39f360c 100644 --- a/README.md +++ b/README.md @@ -171,7 +171,6 @@ A collection of android security related resources. 3. [AXMLPrinter2](http://code.google.com/p/android4me/downloads/detail?name=AXMLPrinter2.jar) - to convert binary XML files to human-readable XML files 4. [adb autocomplete](https://github.com/mbrubeck/android-completion) 5. [Dalvik opcodes](http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html) -6. [Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf) 7. [ExploitMe Android Labs](http://securitycompass.github.io/AndroidLabs/setup.html) - for practice 8. [GoatDroid](https://github.com/jackMannino/OWASP-GoatDroid-Project) - for practice 9. [Android InsecureBank](https://github.com/dineshshetty/Android-InsecureBankv2) - for practice @@ -180,6 +179,7 @@ A collection of android security related resources. 12. [Android Vulnerability Test Suite](https://github.com/AndroidVTS/android-vts) - android-vts scans a device for set of vulnerabilities 13. [AppMon](https://github.com/dpnishant/appmon)- AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida. 14. [Internal Blue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers +15. ~~[Opcodes table for quick reference](http://ww38.xchg.info/corkami/opcodes_tables.pdf)~~ 15. ~~[APK-Downloader](http://codekiem.com/2012/02/24/apk-downloader/)~~ - seems dead now ## Academic/Research/Publications/Books diff --git a/run_awesome_bot.sh b/run_awesome_bot.sh index d87d142..6651a00 100755 --- a/run_awesome_bot.sh +++ b/run_awesome_bot.sh @@ -15,7 +15,8 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/', 'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\ 'http://www.mobilemalware.com.br','https://appscan.bluemix.net',\ 'http://siis.cse.psu.edu/tools.html','http://siis.cse.psu.edu/dare/index.html',\ -'http://codekiem.com/2012/02/24/apk-downloader/','https://apkscan.nviso.be' +'http://codekiem.com/2012/02/24/apk-downloader/','https://apkscan.nviso.be',\ +'http://ww38.xchg.info' FLAKY_URLS='http://safe.ijiami.cn/' SRC_FILE=README.md