mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-24 05:15:27 +00:00
Fix more issues
This commit is contained in:
parent
a8edbadbb7
commit
6bdc38d371
@ -4,4 +4,4 @@ rvm:
|
|||||||
before_script:
|
before_script:
|
||||||
- gem install awesome_bot
|
- gem install awesome_bot
|
||||||
script:
|
script:
|
||||||
- awesome_bot README.md --white-list CONTRIBUTING.md,http://osint.bambenekconsulting.com/feeds/c2-ipmasterlist.txt,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://cryptome.org/2015/09/cti-guide.pdf,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com --allow-ssl --allow-redirect
|
- awesome_bot README.md --white-list CONTRIBUTING.md,http://osint.bambenekconsulting.com/feeds/c2-ipmasterlist.txt,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://cryptome.org/2015/09/cti-guide.pdf,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com,http://example.com --allow-ssl --allow-redirect
|
||||||
|
@ -232,7 +232,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
<a href="https://feodotracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
|
<a href="https://feodotracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
The Feodo Tracker <a href="https://www.abuse.ch/" target="_blank">abuse.ch</a> tracks the Feodo trojan.
|
The Feodo Tracker <a href="https://abuse.ch/" target="_blank">abuse.ch</a> tracks the Feodo trojan.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
@ -581,7 +581,7 @@ The primary goal of Malpedia is to provide a resource for rapid identification a
|
|||||||
<a href="https://zeustracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
|
<a href="https://zeustracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
The ZeuS Tracker by <a href="https://www.abuse.ch/" target="_blank">abuse.ch</a> tracks ZeuS Command & Control servers (hosts) around the world and provides you a domain- and a IP-blocklist.
|
The ZeuS Tracker by <a href="https://abuse.ch/" target="_blank">abuse.ch</a> tracks ZeuS Command & Control servers (hosts) around the world and provides you a domain- and a IP-blocklist.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
@ -1035,7 +1035,7 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
<a href="https://bitbucket.org/camp0/aiengine" target="_blank">AIEngine</a>
|
<a href="https://bitbucket.org/camp0/aiengine" target="_blank">AIEngine</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others. Source available on <a href="https://bitbucket.org/camp0/aiengine" target="_blank">Bitbucket</a>.
|
AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
@ -1734,7 +1734,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511" target="_blank">Structured Analytic Techniques For Intelligence Analysis</a>
|
<a href="https://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511" target="_blank">Structured Analytic Techniques For Intelligence Analysis</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
This book contains methods that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis.
|
This book contains methods that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis.
|
||||||
|
Loading…
Reference in New Issue
Block a user