mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-18 18:26:09 +00:00
Update README.md
-Added BlackLight and Rootkit Arsenal. -Fixed Cuckoo and Viper links
This commit is contained in:
parent
02766fc411
commit
1537256aab
@ -229,7 +229,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
* [AVCaesar](https://avcaesar.malware.lu/) - Malware.lu online scanner and
|
||||
malware repository.
|
||||
* [Cryptam](http://www.cryptam.com/) - Analyze suspicious office documents.
|
||||
* [Cuckoo Sandbox](https://cuckoosandbox.org/) - Open source, self hosted
|
||||
* [Cuckoo Sandbox](https://github.com/cuckoosandbox/cuckoo) - Open source, self hosted
|
||||
sandbox and automated analysis system.
|
||||
* [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified
|
||||
version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
|
||||
@ -540,6 +540,8 @@ the [browser malware](#browser-malware) section.*
|
||||
|
||||
*Tools for dissecting malware in memory images or running systems.*
|
||||
|
||||
* [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS forensics
|
||||
client supporting hiberfil, pagefile, raw memory analysis
|
||||
* [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
|
||||
Malware in Memory, built on Volatility
|
||||
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
||||
@ -583,7 +585,7 @@ the [browser malware](#browser-malware) section.*
|
||||
search malware.
|
||||
* [Polichombr](https://github.com/ANSSI-FR/polichombr) - A malware analysis
|
||||
platform designed to help analysts to reverse malwares collaboratively.
|
||||
* [Viper](http://viper.li/) - A binary management and analysis framework for
|
||||
* [Viper](https://github.com/viper-framework/viper) - A binary management and analysis framework for
|
||||
analysts and researchers.
|
||||
|
||||
## Miscellaneous
|
||||
@ -618,6 +620,8 @@ the [browser malware](#browser-malware) section.*
|
||||
Malware and Threats in Windows, Linux, and Mac Memory.
|
||||
* [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
|
||||
to the World's Most Popular Disassembler.
|
||||
* [The Rootkit Arsenal](https://amzn.com/dp/144962636X) - The Rootkit Arsenal:
|
||||
Escape and Evasion in the Dark Corners of the System
|
||||
|
||||
## Twitter
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user