mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-18 18:36:11 +00:00
Fix conflict in sources
This commit is contained in:
commit
411046f6d5
11
README.md
11
README.md
@ -117,8 +117,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://strongarm.io"
|
<a href="https://strongarm.io" target="_blank">Strongarm, by Percipient Networks</a>
|
||||||
target="_blank">Strongarm, by Percipient Networks</a>
|
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Strongarm is a DNS blackhole that takes action on indicators of compromise by blocking malware command and control. Strongarm aggregates free indicator feeds, integrates with commercial feeds, utilizes Percipient's IOC feeds, and operates DNS resolvers and APIs for you to use to protect your network and business. Strongarm is free for personal use.
|
Strongarm is a DNS blackhole that takes action on indicators of compromise by blocking malware command and control. Strongarm aggregates free indicator feeds, integrates with commercial feeds, utilizes Percipient's IOC feeds, and operates DNS resolvers and APIs for you to use to protect your network and business. Strongarm is free for personal use.
|
||||||
@ -133,6 +132,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
The emphasis of ThreatMiner isn't just about indicators of compromise (IoC) but also to provide analysts with contextual information related to the IoC they are looking at.
|
The emphasis of ThreatMiner isn't just about indicators of compromise (IoC) but also to provide analysts with contextual information related to the IoC they are looking at.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://virusshare.com/" target="_blank">VirusShare</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of malicious code. Access to the site is granted via invitation only.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
## Formats
|
## Formats
|
||||||
|
Loading…
Reference in New Issue
Block a user