Merge pull request #157 from keepwatch/patch-1

Clean up old links
This commit is contained in:
Herman Slatman 2019-04-15 19:44:12 +02:00 committed by GitHub
commit 9aba1897ba
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -750,7 +750,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
<a href="https://github.com/byt3smith/malstrom" target="_blank">Malstrom</a> <a href="https://github.com/byt3smith/malstrom" target="_blank">Malstrom</a>
</td> </td>
<td> <td>
Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation. Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation. Note: Github project has been archived (no new contributions accepted).
</td> </td>
</tr> </tr>
<tr> <tr>
@ -972,14 +972,6 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
The X-Force Exchange (XFE) by IBM XFE is a free SaaS product that you can use to search for threat intelligence information, collect your findings, and share your insights with other members of the XFE community. The X-Force Exchange (XFE) by IBM XFE is a free SaaS product that you can use to search for threat intelligence information, collect your findings, and share your insights with other members of the XFE community.
</td> </td>
</tr> </tr>
<tr>
<td>
<a href="https://yara.adlice.com/" target="_blank">Yara Share</a>
</td>
<td>
Yara Share is an online Yara rule editor and sharing platform.
</td>
</tr>
<tr> <tr>
<td> <td>
<a href="https://yeti-platform.github.io/" target="_blank">Yeti</a> <a href="https://yeti-platform.github.io/" target="_blank">Yeti</a>
@ -1455,14 +1447,6 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
An extension for Chrome that creates hover popups on every page for IPv4, MD5, SHA2, and CVEs. It can be used for lookups during threat investigations. An extension for Chrome that creates hover popups on every page for IPv4, MD5, SHA2, and CVEs. It can be used for lookups during threat investigations.
</td> </td>
</tr> </tr>
<tr>
<td>
<a href="https://www.fidelissecurity.com/resources/fidelis-threatscanner" target="_blank">ThreatScanner</a>
</td>
<td>
ThreatScanner by Fidelis Cybersecurity runs a script to hunt for IOCs or YARA rules on a single machine and automatically generates a report that provides details of suspicious artifacts.
</td>
</tr>
<tr> <tr>
<td> <td>
<a href="https://github.com/michael-yip/ThreatTracker" target="_blank">ThreatTracker</a> <a href="https://github.com/michael-yip/ThreatTracker" target="_blank">ThreatTracker</a>