mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-18 18:26:09 +00:00
Rearrange TOC, add @radare 2
This commit is contained in:
parent
215bc15096
commit
ec128aef18
10
README.md
10
README.md
@ -15,10 +15,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
- [Documents and Shellcode](#documents-and-shellcode)
|
||||
- [File Carving](#file-carving)
|
||||
- [Deobfuscation](#deobfuscation)
|
||||
- [Static Executable Analysis](#static-executable-analysis)
|
||||
- [Windows Binaries](#windows-binaries)
|
||||
- [Linux Binaries](#linux-binaries)
|
||||
- [Debugging](#debugging)
|
||||
- [Debugging and Reverse Engineering](#debugging-and-reverse-engineering)
|
||||
- [Network](#network)
|
||||
- [Memory Forensics](#memory-forensics)
|
||||
- [Miscellaneous](#miscellaneous)
|
||||
@ -141,6 +138,11 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
||||
* [Spidermonkey](https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey) -
|
||||
Mozilla's JavaScript engine, for debugging malicious JS.
|
||||
|
||||
## Debugging and Reverse Engineering
|
||||
|
||||
* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
|
||||
debugger support.
|
||||
|
||||
## Memory Forensics
|
||||
|
||||
*Tools for dissecting malware in memory images or running systems.*
|
||||
|
Loading…
Reference in New Issue
Block a user