mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-10-01 06:35:40 -04:00
Update toc
This commit is contained in:
parent
794da6fecc
commit
14418386f2
31
README.md
31
README.md
@ -4,27 +4,26 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
[awesome-python](https://github.com/vinta/awesome-python) and
|
[awesome-python](https://github.com/vinta/awesome-python) and
|
||||||
[awesome-php](https://github.com/ziadoz/awesome-php).
|
[awesome-php](https://github.com/ziadoz/awesome-php).
|
||||||
|
|
||||||
- [Awesome Malware Analysis](#awesome-malware-analysis)
|
- [Malware Collection](#malware-collection)
|
||||||
- [Malware Collection](#malware-collection)
|
|
||||||
- [Anonymizers](#anonymizers)
|
- [Anonymizers](#anonymizers)
|
||||||
- [Honeypots](#honeypots)
|
- [Honeypots](#honeypots)
|
||||||
- [Malware Corpora](#malware-corpora)
|
- [Malware Corpora](#malware-corpora)
|
||||||
- [Open Source Threat Intelligence](#open-source-threat-intelligence)
|
- [Open Source Threat Intelligence](#open-source-threat-intelligence)
|
||||||
- [Tools](#tools)
|
- [Tools](#tools)
|
||||||
- [Other Resources](#other-resources)
|
- [Other Resources](#other-resources)
|
||||||
- [Detection and Classification](#detection-and-classification)
|
- [Detection and Classification](#detection-and-classification)
|
||||||
- [Online Scanners and Sandboxes](#online-scanners-and-sandboxes)
|
- [Online Scanners and Sandboxes](#online-scanners-and-sandboxes)
|
||||||
- [Domain Analysis](#domain-analysis)
|
- [Domain Analysis](#domain-analysis)
|
||||||
- [Browser Malware](#browser-malware)
|
- [Browser Malware](#browser-malware)
|
||||||
- [Documents and Shellcode](#documents-and-shellcode)
|
- [Documents and Shellcode](#documents-and-shellcode)
|
||||||
- [File Carving](#file-carving)
|
- [File Carving](#file-carving)
|
||||||
- [Deobfuscation](#deobfuscation)
|
- [Deobfuscation](#deobfuscation)
|
||||||
- [Debugging and Reverse Engineering](#debugging-and-reverse-engineering)
|
- [Debugging and Reverse Engineering](#debugging-and-reverse-engineering)
|
||||||
- [Network](#network)
|
- [Network](#network)
|
||||||
- [Memory Forensics](#memory-forensics)
|
- [Memory Forensics](#memory-forensics)
|
||||||
- [Windows Artifacts](#windows-artifacts)
|
- [Windows Artifacts](#windows-artifacts)
|
||||||
- [Storage and Workflow](#storage-and-workflow)
|
- [Storage and Workflow](#storage-and-workflow)
|
||||||
- [Miscellaneous](#miscellaneous)
|
- [Miscellaneous](#miscellaneous)
|
||||||
- [Resources](#resources)
|
- [Resources](#resources)
|
||||||
- [Books](#books)
|
- [Books](#books)
|
||||||
- [Twitter](#twitter)
|
- [Twitter](#twitter)
|
||||||
|
Loading…
Reference in New Issue
Block a user