mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-18 10:26:07 +00:00
Fix and remove some links that are likely dead and/or discontinued
This commit is contained in:
parent
263d44f529
commit
6e896a8e6a
22
README.md
22
README.md
@ -166,11 +166,9 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
* [malc0de](http://malc0de.com/database/) - Searchable incident database.
|
||||
* [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share
|
||||
malicious URLs.
|
||||
* [Metadefender.com Threat Intelligence Feeds](https://www.metadefender.com/threat-intelligence-feeds) -
|
||||
List of the most looked up file hashes from Metadefender.com malware feed.
|
||||
* [OpenIOC](http://openioc.org/) - Framework for sharing threat intelligence.
|
||||
* [Palevo Blocklists](https://palevotracker.abuse.ch/blocklists.php) - Botnet
|
||||
C&C blocklists.
|
||||
* [Metadefender Threat Intelligence Feeds](https://metadefender.opswat.com/threat-intelligence-feeds) -
|
||||
List of the most looked up file hashes from Metadefender malware feed.
|
||||
* [OpenIOC](https://openioc.org/) - Framework for sharing threat intelligence.
|
||||
* [Proofpoint Threat Intelligence](https://www.proofpoint.com/us/products/et-intelligence) -
|
||||
Rulesets and more. (Formerly Emerging Threats.)
|
||||
* [Ransomware overview](https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml) -
|
||||
@ -281,9 +279,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
the configuration settings from common malwares.
|
||||
* [Malwr](https://malwr.com/) - Free analysis with an online Cuckoo Sandbox
|
||||
instance.
|
||||
* [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static
|
||||
analysis of malware.
|
||||
* [Metadefender.com](https://www.metadefender.com) - Scan a file, hash or IP
|
||||
* [Metadefender](https://metadefender.opswat.com/ ) - Scan a file, hash or IP
|
||||
address for malware (free).
|
||||
* [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes
|
||||
pcap files and facilitates the quick detection of viruses, worms, trojans, and all
|
||||
@ -295,8 +291,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
* [ProcDot](http://www.procdot.com) - A graphical malware analysis tool kit.
|
||||
* [Recomposer](https://github.com/secretsquirrel/recomposer) - A helper
|
||||
script for safely uploading binaries to sandbox sites.
|
||||
* [Sand droid](http://sanddroid.xjtu.edu.cn/) - Automatic and complete
|
||||
Android application analysis system.
|
||||
* [SEE](https://github.com/F-Secure/see) - Sandboxed Execution Environment (SEE)
|
||||
is a framework for building test automation in secured Environments.
|
||||
* [SEKOIA Dropper Analysis](https://malware.sekoia.fr/) - Online dropper analysis (Js, VBScript, Microsoft Office, PDF).
|
||||
@ -423,8 +417,8 @@ the [browser malware](#browser-malware) section.*
|
||||
Event Log files from raw binary data.
|
||||
* [Foremost](http://foremost.sourceforge.net/) - File carving tool designed
|
||||
by the US Air Force.
|
||||
* [Hachoir](https://bitbucket.org/haypo/hachoir) - A collection of Python
|
||||
libraries for dealing with binary files.
|
||||
* [hachoir3](https://github.com/vstinner/hachoir3) - Hachoir is a Python library
|
||||
to view and edit a binary stream field by field.
|
||||
* [Scalpel](https://github.com/sleuthkit/scalpel) - Another data carving
|
||||
tool.
|
||||
* [SFlock](https://github.com/jbremer/sflock) - Nested archive
|
||||
@ -631,7 +625,7 @@ the [browser malware](#browser-malware) section.*
|
||||
Malware in Memory, built on Volatility.
|
||||
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
||||
Volatility Memory Forensics Framework.
|
||||
* [FindAES](http://jessekornblum.livejournal.com/269749.html) - Find AES
|
||||
* [FindAES](https://sourceforge.net/projects/findaes/) - Find AES
|
||||
encryption keys in memory.
|
||||
* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - High speed memory
|
||||
analysis framework developed in .NET supports all Windows x64, includes
|
||||
@ -689,8 +683,6 @@ the [browser malware](#browser-malware) section.*
|
||||
|
||||
* [al-khaser](https://github.com/LordNoteworthy/al-khaser) - A PoC malware
|
||||
with good intentions that aimes to stress anti-malware systems.
|
||||
* [Binarly](http://www.binar.ly/search) - Search engine for bytes in a large
|
||||
corpus of malware.
|
||||
* [DC3-MWCP](https://github.com/Defense-Cyber-Crime-Center/DC3-MWCP) -
|
||||
The Defense Cyber Crime Center's Malware Configuration Parser framework.
|
||||
* [FLARE VM](https://github.com/fireeye/flare-vm) - A fully customizable,
|
||||
|
Loading…
Reference in New Issue
Block a user