From 79ef124bda58f4ddf1d0c91c0988bb8e6e09a8a6 Mon Sep 17 00:00:00 2001 From: Keep Watcher Date: Thu, 21 Mar 2019 10:24:31 -0400 Subject: [PATCH] Cleaning up old links Removed two dead resources and noted that Malstrom is archived on Github. --- README.md | 18 +----------------- 1 file changed, 1 insertion(+), 17 deletions(-) diff --git a/README.md b/README.md index d0cedb8..ef5f9fe 100644 --- a/README.md +++ b/README.md @@ -750,7 +750,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari Malstrom - Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation. + Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation. Note: Github project has been archived (no new contributions accepted). @@ -972,14 +972,6 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari The X-Force Exchange (XFE) by IBM XFE is a free SaaS product that you can use to search for threat intelligence information, collect your findings, and share your insights with other members of the XFE community. - - - Yara Share - - - Yara Share is an online Yara rule editor and sharing platform. - - Yeti @@ -1455,14 +1447,6 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly An extension for Chrome that creates hover popups on every page for IPv4, MD5, SHA2, and CVEs. It can be used for lookups during threat investigations. - - - ThreatScanner - - - ThreatScanner by Fidelis Cybersecurity runs a script to hunt for IOCs or YARA rules on a single machine and automatically generates a report that provides details of suspicious artifacts. - - ThreatTracker