From 6e896a8e6adefea45e5fc040e518d1442529c8b8 Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Tue, 28 Nov 2017 20:50:55 +0100 Subject: [PATCH] Fix and remove some links that are likely dead and/or discontinued --- README.md | 22 +++++++--------------- 1 file changed, 7 insertions(+), 15 deletions(-) diff --git a/README.md b/README.md index b6d1173..6b1a57a 100644 --- a/README.md +++ b/README.md @@ -166,11 +166,9 @@ A curated list of awesome malware analysis tools and resources. Inspired by * [malc0de](http://malc0de.com/database/) - Searchable incident database. * [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share malicious URLs. -* [Metadefender.com Threat Intelligence Feeds](https://www.metadefender.com/threat-intelligence-feeds) - - List of the most looked up file hashes from Metadefender.com malware feed. -* [OpenIOC](http://openioc.org/) - Framework for sharing threat intelligence. -* [Palevo Blocklists](https://palevotracker.abuse.ch/blocklists.php) - Botnet - C&C blocklists. +* [Metadefender Threat Intelligence Feeds](https://metadefender.opswat.com/threat-intelligence-feeds) - + List of the most looked up file hashes from Metadefender malware feed. +* [OpenIOC](https://openioc.org/) - Framework for sharing threat intelligence. * [Proofpoint Threat Intelligence](https://www.proofpoint.com/us/products/et-intelligence) - Rulesets and more. (Formerly Emerging Threats.) * [Ransomware overview](https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml) - @@ -281,9 +279,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by the configuration settings from common malwares. * [Malwr](https://malwr.com/) - Free analysis with an online Cuckoo Sandbox instance. -* [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static - analysis of malware. -* [Metadefender.com](https://www.metadefender.com) - Scan a file, hash or IP +* [Metadefender](https://metadefender.opswat.com/ ) - Scan a file, hash or IP address for malware (free). * [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes pcap files and facilitates the quick detection of viruses, worms, trojans, and all @@ -295,8 +291,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by * [ProcDot](http://www.procdot.com) - A graphical malware analysis tool kit. * [Recomposer](https://github.com/secretsquirrel/recomposer) - A helper script for safely uploading binaries to sandbox sites. -* [Sand droid](http://sanddroid.xjtu.edu.cn/) - Automatic and complete - Android application analysis system. * [SEE](https://github.com/F-Secure/see) - Sandboxed Execution Environment (SEE) is a framework for building test automation in secured Environments. * [SEKOIA Dropper Analysis](https://malware.sekoia.fr/) - Online dropper analysis (Js, VBScript, Microsoft Office, PDF). @@ -423,8 +417,8 @@ the [browser malware](#browser-malware) section.* Event Log files from raw binary data. * [Foremost](http://foremost.sourceforge.net/) - File carving tool designed by the US Air Force. -* [Hachoir](https://bitbucket.org/haypo/hachoir) - A collection of Python - libraries for dealing with binary files. +* [hachoir3](https://github.com/vstinner/hachoir3) - Hachoir is a Python library + to view and edit a binary stream field by field. * [Scalpel](https://github.com/sleuthkit/scalpel) - Another data carving tool. * [SFlock](https://github.com/jbremer/sflock) - Nested archive @@ -631,7 +625,7 @@ the [browser malware](#browser-malware) section.* Malware in Memory, built on Volatility. * [evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework. -* [FindAES](http://jessekornblum.livejournal.com/269749.html) - Find AES +* [FindAES](https://sourceforge.net/projects/findaes/) - Find AES encryption keys in memory. * [inVtero.net](https://github.com/ShaneK2/inVtero.net) - High speed memory analysis framework developed in .NET supports all Windows x64, includes @@ -689,8 +683,6 @@ the [browser malware](#browser-malware) section.* * [al-khaser](https://github.com/LordNoteworthy/al-khaser) - A PoC malware with good intentions that aimes to stress anti-malware systems. -* [Binarly](http://www.binar.ly/search) - Search engine for bytes in a large - corpus of malware. * [DC3-MWCP](https://github.com/Defense-Cyber-Crime-Center/DC3-MWCP) - The Defense Cyber Crime Center's Malware Configuration Parser framework. * [FLARE VM](https://github.com/fireeye/flare-vm) - A fully customizable,