mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-18 18:26:09 +00:00
commit
b276b3937b
@ -4,4 +4,5 @@ rvm:
|
||||
before_script:
|
||||
- gem install awesome_bot
|
||||
script:
|
||||
- awesome_bot README.md --white-list CONTRIBUTING.md,amzn.com,carnivore.it,domaintools.com,cymru.com,clean-mx.de,woodmann.com,andrototal.org,crdf.fr,zscaler.com,fireeye,threatcrowd
|
||||
- awesome_bot README.md --white-list CONTRIBUTING.md,amzn.com,carnivore.it,domaintools.com,cymru.com,clean-mx.de,woodmann.com,andrototal.org,crdf.fr,zscaler.com,fireeye,threatcrowd,hybrid-analysis
|
||||
|
||||
|
10
README.md
10
README.md
@ -86,7 +86,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
analysts.
|
||||
* [ViruSign](http://www.virusign.com/) - Malware database that detected by
|
||||
many anti malware programs except ClamAV.
|
||||
* [VirusShare](http://virusshare.com/) - Malware repository, registration
|
||||
* [VirusShare](https://virusshare.com/) - Malware repository, registration
|
||||
* [Zeltser's Sources](https://zeltser.com/malware-sample-sources/) - A list
|
||||
of malware sample sources put together by Lenny Zeltser.
|
||||
* [Zeus Source Code](https://github.com/Visgean/Zeus) - Source for the Zeus
|
||||
@ -240,8 +240,6 @@ research.
|
||||
instance.
|
||||
* [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static
|
||||
analysis of malware.
|
||||
* [Metascan Online](https://live.metascan-online.com/) - Free file scanning
|
||||
with multiple antivirus engines.
|
||||
* [Noriben](https://github.com/Rurik/Noriben) - Uses Sysinternals Procmon to
|
||||
collect information about malware in a sandboxed environment.
|
||||
* [PDF Examiner](http://www.pdfexaminer.com/) - Analyse suspicious PDF files.
|
||||
@ -272,7 +270,7 @@ research.
|
||||
* [SenderBase](http://www.senderbase.org/) - Search for IP, domain or network
|
||||
owner.
|
||||
* [SpamCop](https://www.spamcop.net/bl.shtml) - IP based spam block list.
|
||||
* [SpamHaus](http://www.spamhaus.org/lookup/) - Block list based on
|
||||
* [SpamHaus](https://www.spamhaus.org/lookup/) - Block list based on
|
||||
domains and IPs.
|
||||
* [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware
|
||||
and Security Scanner.
|
||||
@ -327,7 +325,7 @@ the [browser malware](#browser-malware) section.*
|
||||
malicious traces in MS Office documents.
|
||||
* [olevba](http://www.decalage.info/python/olevba) - A script for parsing OLE
|
||||
and OpenXML documents and extracting useful information.
|
||||
* [Origami PDF](https://code.google.com/p/origami-pdf/) - A tool for
|
||||
* [Origami PDF](https://code.google.com/archive/p/origami-pdf) - A tool for
|
||||
analyzing malicious PDFs, and more.
|
||||
* [PDF Tools](http://blog.didierstevens.com/programs/pdf-tools/) - pdfid,
|
||||
pdf-parser, and more from Didier Stevens.
|
||||
@ -428,7 +426,7 @@ the [browser malware](#browser-malware) section.*
|
||||
debugger support.
|
||||
* [SMRT](https://github.com/pidydx/SMRT) - Sublime Malware Research Tool, a
|
||||
plugin for Sublime 3 to aid with malware analyis.
|
||||
* [strace](http://sourceforge.net/projects/strace/) - Dynamic analysis for
|
||||
* [strace](https://sourceforge.net/projects/strace/) - Dynamic analysis for
|
||||
Linux executables.
|
||||
* [Udis86](https://github.com/vmt/udis86) - Disassembler library and tool
|
||||
for x86 and x86_64.
|
||||
|
Loading…
Reference in New Issue
Block a user