From 8fc75aee5c8b8ce446c059819f1b0f5fe4df415c Mon Sep 17 00:00:00 2001 From: "Keith J. Jones" Date: Wed, 31 Aug 2016 10:30:42 -0400 Subject: [PATCH 1/3] Added host and file intelligence tools by keithjjones. --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 2dc6f19..d7c85a5 100644 --- a/README.md +++ b/README.md @@ -132,6 +132,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by Google Custom Search Engines. * [TIQ-test](https://github.com/mlsecproject/tiq-test) - Data visualization and statistical analysis of Threat Intelligence feeds. +* [hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host +* [fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash ### Other Resources From b2a6d0891d414733d6027ec0d5f79b1be9cf6d9b Mon Sep 17 00:00:00 2001 From: "Keith J. Jones" Date: Wed, 31 Aug 2016 10:43:08 -0400 Subject: [PATCH 2/3] Alphabetized and capitalized. --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d7c85a5..336bfac 100644 --- a/README.md +++ b/README.md @@ -108,6 +108,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by collaborate in developing Threat Intelligence. * [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat Intelligence indicators from publicly available sources. +* [Fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash +* [Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host * [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) - A tool for CERTs for processing incident data using a message queue. * [IOC Editor](https://www.fireeye.com/services/freeware/ioc-editor.html) - @@ -132,8 +134,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by Google Custom Search Engines. * [TIQ-test](https://github.com/mlsecproject/tiq-test) - Data visualization and statistical analysis of Threat Intelligence feeds. -* [hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host -* [fileintel](https://github.com/keithjjones/fileintel) - Pull intelligence per file hash ### Other Resources From 3eaaf6d7c40e6187f9ce063a44982649d6e1c8ee Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Sun, 11 Sep 2016 16:30:41 +0200 Subject: [PATCH 3/3] Add CriticalStack to whitelist --- .travis.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.travis.yml b/.travis.yml index 7e8a98f..1f4f376 100644 --- a/.travis.yml +++ b/.travis.yml @@ -4,4 +4,4 @@ rvm: before_script: - gem install awesome_bot script: - - awesome_bot README.md --white-list CONTRIBUTING.md,amzn.com,carnivore.it,cymru.com,clean-mx.de,woodmann.com,andrototal.org,domaintools.com,reconstructer.org,reddit.com,desenmascara.me,exploit-db.com,travis-ci,tekdefense.com,winitor.com + - awesome_bot README.md --white-list CONTRIBUTING.md,amzn.com,carnivore.it,cymru.com,clean-mx.de,woodmann.com,andrototal.org,domaintools.com,reconstructer.org,reddit.com,desenmascara.me,exploit-db.com,travis-ci,tekdefense.com,winitor.com,https://intel.criticalstack.com