From 34bb94a49aad8336a3c546fe1c4a662ea9621f95 Mon Sep 17 00:00:00 2001 From: rshipp Date: Tue, 22 Sep 2015 16:56:40 +0200 Subject: [PATCH] Fix wrapping, grammar, formatting Also removed extra Anubis entry --- README.md | 36 ++++++++++++++++++++++-------------- 1 file changed, 22 insertions(+), 14 deletions(-) diff --git a/README.md b/README.md index 7e603fc..be9f881 100644 --- a/README.md +++ b/README.md @@ -86,8 +86,10 @@ A curated list of awesome malware analysis tools and resources. Inspired by trojan leaked in 2011. * [Malshare](http://malshare.com) - Large repository of malware actively scrapped from malicious sites. -* [VirusShare](http://virusshare.com/) - Malware repository, registration required. -* [ViruSign](http://www.virusign.com/) - Malware database that detected by many anti malware programs except ClamAV. +* [VirusShare](http://virusshare.com/) - Malware repository, registration + required. +* [ViruSign](http://www.virusign.com/) - Malware database that detected by + many anti malware programs except ClamAV. ## Open Source Threat Intelligence @@ -121,6 +123,10 @@ A curated list of awesome malware analysis tools and resources. Inspired by plugin and blocklist. * [CI Army](http://www.ciarmy.com/) ([list](http://www.ciarmy.com/list/ci-badguys.txt)) - Network security blocklists. +* [Critical Stack- Free Intel Market](https://intel.CriticalStack.com) - Free + intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators. +* [CRDF ThreatCenter](http://threatcenter.crdf.fr/) - List of new threats detected + by CRDF anti-malware. * [Emerging Threats](http://www.emergingthreats.net/) - Rulesets and more. * [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise shared publicly by FireEye. @@ -136,9 +142,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by C&C blocklists. * [ZeuS Tracker](https://zeustracker.abuse.ch/blocklist.php) - ZeuS blocklists. -* [Critical Stack- Free Intel Market](https://intel.CriticalStack.com) - Free - intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators. -* [CRDF ThreatCenter](http://threatcenter.crdf.fr/) - List of new threats detected by CRDF anti-malware. * [Yara rules](https://github.com/Yara-Rules/rules) - Yara rules repository. ## Detection and Classification @@ -173,20 +176,23 @@ A curated list of awesome malware analysis tools and resources. Inspired by * [YARA](https://plusvic.github.io/yara/) - Pattern matching tool for analysts. * [Loki](https://github.com/Neo23x0/Loki) - Host based scanner for IOCs. -* [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate yara rules based on a set of malware samples. Also contains a good_strings DB to avoid false positives. +* [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate + yara rules based on a set of malware samples. Also contains a good + strings DB to avoid false positives. ## Online Scanners and Sandboxes *Web-based multi-AV scanners, and malware sandboxes for automated analysis.* -* [Anubis](https://anubis.iseclab.org/) - Malware Analysis for Unknown Binaries and Site Check. +* [Anubis](https://anubis.iseclab.org/) - Malware Analysis for Unknown Binaries + and Site Check. * [AVCaesar](https://avcaesar.malware.lu/) - Malware.lu online scanner and malware repository. * [Cuckoo Sandbox](http://cuckoosandbox.org/) - Open source, self hosted sandbox and automated analysis system. -* [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified version - of Cuckoo Sandbox released under the GPL. Not merged upstream due to legal - concerns by the author. +* [cuckoo-modified](https://github.com/brad-accuvant/cuckoo-modified) - Modified + version of Cuckoo Sandbox released under the GPL. Not merged upstream due to + legal concerns by the author. * [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis system. * [Hybrid Analysis](https://www.hybrid-analysis.com/) - Online malware @@ -198,7 +204,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by instance. * [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static analysis of malware. -* [Metascan Online](https://www.metascan-online.com/en) - Free file scanning with multiple antivirus engines. +* [Metascan Online](https://www.metascan-online.com/en) - Free file scanning + with multiple antivirus engines. * [Noriben](https://github.com/Rurik/Noriben) - Uses Sysinternals Procmon to collect information about malware in a sandboxed environment. * [Recomposer](https://github.com/secretsquirrel/recomposer) - A helper @@ -212,13 +219,14 @@ A curated list of awesome malware analysis tools and resources. Inspired by *Inspect domains and IP addresses.* -* [Anubis](https://anubis.iseclab.org/) - Malware Analysis for Unknown Binaries and Site Check. -* [Desenmascara.me](http://desenmascara.me) - One click tool to retrieve all the metadata as possible for a website and to assess its good standing. +* [Desenmascara.me](http://desenmascara.me) - One click tool to retrieve as + much metadata as possible for a website and to assess its good standing. * [Dig](http://networking.ringofsaturn.com/) - Free online dig and other network tools. * [IPinfo](https://github.com/hiddenillusion/IPinfo) - Gather information about an IP or domain by searching online resources. -* [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware and Security Scanner. +* [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware + and Security Scanner. * [TekDefense Automator](http://www.tekdefense.com/automater/) - OSINT tool for gatherig information about URLs, IPs, or hashes. * [Whois](http://whois.domaintools.com/) - DomainTools free online whois