From 4fccc84e267b12d7dfb6a6de6d4c80745ade3075 Mon Sep 17 00:00:00 2001 From: hudsonrock-partnerships <163282900+hudsonrock-partnerships@users.noreply.github.com> Date: Tue, 23 Jul 2024 10:54:27 +0300 Subject: [PATCH] Added Hudson Rock to Malware section (#204) * Added Hudson Rock to Malware section Free cybercrime intelligence toolset that can indicate if a specific APK package was compromised in an Infostealer malware attack. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 72c5691..c3515f8 100644 --- a/README.md +++ b/README.md @@ -259,6 +259,7 @@ A collection of Android security-related resources. 1. [Android Malware Genome Project](http://www.malgenomeproject.org/policy.html) - contains 1260 malware samples categorized into 49 different malware families, free for research purposes. 1. [Contagio Mobile Malware Mini Dump](http://contagiominidump.blogspot.com) 1. [Drebin](https://www.sec.tu-bs.de/~danarp/drebin/) +1. [Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Free cybercrime intelligence toolset that can indicate if a specific APK package was compromised in an Infostealer malware attack. 1. [Kharon Malware Dataset](http://kharon.gforge.inria.fr/dataset/) - 7 malware which have been reverse-engineered and documented 1. [Android Adware and General Malware Dataset](https://www.unb.ca/cic/datasets/android-adware.html) 1. [AndroZoo](https://androzoo.uni.lu/) - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.