mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-10-01 06:35:40 -04:00
Update README.md
Wrap some lines.
This commit is contained in:
parent
d8e977ae82
commit
1ee846b0e3
15
README.md
15
README.md
@ -800,9 +800,13 @@ the [browser malware](#browser-malware) section.*
|
||||
blog and resources by Lenny Zeltser.
|
||||
* [Malware Analysis Search](https://cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) -
|
||||
Custom Google search engine from [Corey Harrell](journeyintoir.blogspot.com/).
|
||||
* [Malware Analysis Tutorials](http://fumalwareanalysis.blogspot.nl/p/malware-analysis-tutorials-reverse.html) - The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for learning
|
||||
* [Malware Analysis Tutorials](http://fumalwareanalysis.blogspot.nl/p/malware-analysis-tutorials-reverse.html) -
|
||||
The Malware Analysis Tutorials by Dr. Xiang Fu, a great resource for learning
|
||||
practical malware analysis.
|
||||
* [Malware analysis, threat intelligence and reverse engineering](https://www.slideshare.net/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering) - Presentation introducing the concepts of malware analysis, threat intelligence and reverse engineering. Experience or prior knowledge is not required.
|
||||
* [Malware Analysis, Threat Intelligence and Reverse Engineering](https://www.slideshare.net/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering) -
|
||||
Presentation introducing the concepts of malware analysis, threat intelligence
|
||||
and reverse engineering. Experience or prior knowledge is not required. Labs
|
||||
link in description.
|
||||
* [Malware Samples and Traffic](http://malware-traffic-analysis.net/) - This
|
||||
blog focuses on network traffic related to malware infections.
|
||||
* [Practical Malware Analysis Starter Kit](https://bluesoul.me/practical-malware-analysis-starter-kit/) -
|
||||
@ -813,14 +817,17 @@ the [browser malware](#browser-malware) section.*
|
||||
Institute during Fall 2015.
|
||||
* [WindowsIR: Malware](http://windowsir.blogspot.com/p/malware.html) - Harlan
|
||||
Carvey's page on Malware.
|
||||
* [Windows Registry specification](https://github.com/msuhanov/regf/blob/master/Windows%20registry%20file%20format%20specification.md) - Windows registry file format specification.
|
||||
* [Windows Registry specification](https://github.com/msuhanov/regf/blob/master/Windows%20registry%20file%20format%20specification.md) -
|
||||
Windows registry file format specification.
|
||||
* [/r/csirt_tools](https://www.reddit.com/r/csirt_tools/) - Subreddit for CSIRT
|
||||
tools and resources, with a
|
||||
[malware analysis](https://www.reddit.com/r/csirt_tools/search?q=flair%3A%22Malware%20analysis%22&sort=new&restrict_sr=on) flair.
|
||||
* [/r/Malware](https://www.reddit.com/r/Malware) - The malware subreddit.
|
||||
* [/r/ReverseEngineering](https://www.reddit.com/r/ReverseEngineering) -
|
||||
Reverse engineering subreddit, not limited to just malware.
|
||||
* [Ember](https://github.com/endgameinc/ember) - Endgame Malware BEnchmark for Research, a repository that makes it easy to (re)create a machine learning model that can be used to predict a score for a PE file based on static analysis.
|
||||
* [Ember](https://github.com/endgameinc/ember) - Endgame Malware BEnchmark for Research,
|
||||
a repository that makes it easy to (re)create a machine learning model that can be used
|
||||
to predict a score for a PE file based on static analysis.
|
||||
|
||||
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user