mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2025-01-05 10:25:26 +00:00
Update README.md
-Added BlackLight and Rootkit Arsenal. -Fixed Cuckoo and Viper links
This commit is contained in:
parent
02766fc411
commit
1537256aab
@ -229,7 +229,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
* [AVCaesar](https://avcaesar.malware.lu/) - Malware.lu online scanner and
|
* [AVCaesar](https://avcaesar.malware.lu/) - Malware.lu online scanner and
|
||||||
malware repository.
|
malware repository.
|
||||||
* [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
|
* [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
|
||||||
* [Cuckoo Sandbox](https://cuckoosandbox.org/) - Open source, self hosted
|
* [Cuckoo Sandbox](https://github.com/cuckoosandbox/cuckoo) - Open source, self hosted
|
||||||
sandbox and automated analysis system.
|
sandbox and automated analysis system.
|
||||||
* [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified
|
* [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified
|
||||||
version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
|
version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
|
||||||
@ -540,6 +540,8 @@ the [browser malware](#browser-malware) section.*
|
|||||||
|
|
||||||
*Tools for dissecting malware in memory images or running systems.*
|
*Tools for dissecting malware in memory images or running systems.*
|
||||||
|
|
||||||
|
* [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS forensics
|
||||||
|
client supporting hiberfil, pagefile, raw memory analysis
|
||||||
* [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
|
* [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
|
||||||
Malware in Memory, built on Volatility
|
Malware in Memory, built on Volatility
|
||||||
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
||||||
@ -583,7 +585,7 @@ the [browser malware](#browser-malware) section.*
|
|||||||
search malware.
|
search malware.
|
||||||
* [Polichombr](https://github.com/ANSSI-FR/polichombr) - A malware analysis
|
* [Polichombr](https://github.com/ANSSI-FR/polichombr) - A malware analysis
|
||||||
platform designed to help analysts to reverse malwares collaboratively.
|
platform designed to help analysts to reverse malwares collaboratively.
|
||||||
* [Viper](http://viper.li/) - A binary management and analysis framework for
|
* [Viper](https://github.com/viper-framework/viper) - A binary management and analysis framework for
|
||||||
analysts and researchers.
|
analysts and researchers.
|
||||||
|
|
||||||
## Miscellaneous
|
## Miscellaneous
|
||||||
@ -618,6 +620,8 @@ the [browser malware](#browser-malware) section.*
|
|||||||
Malware and Threats in Windows, Linux, and Mac Memory.
|
Malware and Threats in Windows, Linux, and Mac Memory.
|
||||||
* [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
|
* [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
|
||||||
to the World's Most Popular Disassembler.
|
to the World's Most Popular Disassembler.
|
||||||
|
* [The Rootkit Arsenal](https://amzn.com/dp/144962636X) - The Rootkit Arsenal:
|
||||||
|
Escape and Evasion in the Dark Corners of the System
|
||||||
|
|
||||||
## Twitter
|
## Twitter
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user