mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-18 18:26:09 +00:00
Fix fport category/description
This commit is contained in:
parent
fe8c31e8b3
commit
4648aa5005
@ -110,7 +110,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
* [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
|
* [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
|
||||||
Intelligence indicators from publicly available sources.
|
Intelligence indicators from publicly available sources.
|
||||||
* [Fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash.
|
* [Fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash.
|
||||||
* [FPort](http://www.mcafee.com/us/downloads/free-tools/fport.aspx#) - fport reports all open TCP/IP and UDP ports and maps them to the owning application.
|
|
||||||
* [Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host.
|
* [Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host.
|
||||||
* [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
|
* [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
|
||||||
A tool for CERTs for processing incident data using a message queue.
|
A tool for CERTs for processing incident data using a message queue.
|
||||||
@ -448,6 +447,8 @@ the [browser malware](#browser-malware) section.*
|
|||||||
modular debugger with a Qt GUI.
|
modular debugger with a Qt GUI.
|
||||||
* [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration
|
* [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration
|
||||||
and tracing of the Windows kernel.
|
and tracing of the Windows kernel.
|
||||||
|
* [FPort](http://www.mcafee.com/us/downloads/free-tools/fport.aspx#) - Reports
|
||||||
|
open TCP/IP and UDP ports in a live system and maps them to the owning application.
|
||||||
* [GDB](http://www.sourceware.org/gdb/) - The GNU debugger.
|
* [GDB](http://www.sourceware.org/gdb/) - The GNU debugger.
|
||||||
* [GEF](https://github.com/hugsy/gef) - GDB Enhanced Features, for exploiters
|
* [GEF](https://github.com/hugsy/gef) - GDB Enhanced Features, for exploiters
|
||||||
and reverse engineers.
|
and reverse engineers.
|
||||||
|
Loading…
Reference in New Issue
Block a user