mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2025-01-08 22:27:57 -05:00
Fix more whitespace and add periods
This commit is contained in:
parent
6d7827d58a
commit
45e1106d39
23
README.md
23
README.md
@ -79,7 +79,6 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
samples.
|
samples.
|
||||||
* [Malshare](https://malshare.com) - Large repository of malware actively
|
* [Malshare](https://malshare.com) - Large repository of malware actively
|
||||||
scrapped from malicious sites.
|
scrapped from malicious sites.
|
||||||
samples directly from a number of online sources.
|
|
||||||
* [MalwareDB](http://malwaredb.malekal.com/) - Malware samples repository.
|
* [MalwareDB](http://malwaredb.malekal.com/) - Malware samples repository.
|
||||||
* [Open Malware Project](http://openmalware.org/) - Sample information and
|
* [Open Malware Project](http://openmalware.org/) - Sample information and
|
||||||
downloads. Formerly Offensive Computing.
|
downloads. Formerly Offensive Computing.
|
||||||
@ -161,7 +160,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
|
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
|
||||||
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
|
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
|
||||||
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
|
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
|
||||||
searchable incident database, with a web [API](https://dshield.org/api/)
|
searchable incident database, with a web [API](https://dshield.org/api/).
|
||||||
([unofficial Python library](https://github.com/rshipp/python-dshield)).
|
([unofficial Python library](https://github.com/rshipp/python-dshield)).
|
||||||
* [malc0de](http://malc0de.com/database/) - Searchable incident database.
|
* [malc0de](http://malc0de.com/database/) - Searchable incident database.
|
||||||
* [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share
|
* [Malware Domain List](http://www.malwaredomainlist.com/) - Search and share
|
||||||
@ -195,8 +194,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
* [AnalyzePE](https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
|
||||||
variety of tools for reporting on Windows PE files.
|
variety of tools for reporting on Windows PE files.
|
||||||
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
* [BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
|
||||||
AWS pipeline that scans and alerts on uploaded files based on a set of
|
AWS pipeline that scans and alerts on uploaded files based on a set of
|
||||||
YARA rules.
|
YARA rules.
|
||||||
* [chkrootkit](http://www.chkrootkit.org/) - Local Linux rootkit detection.
|
* [chkrootkit](http://www.chkrootkit.org/) - Local Linux rootkit detection.
|
||||||
* [ClamAV](http://www.clamav.net/) - Open source antivirus engine.
|
* [ClamAV](http://www.clamav.net/) - Open source antivirus engine.
|
||||||
* [Detect-It-Easy](https://github.com/horsicq/Detect-It-Easy) - A program for
|
* [Detect-It-Easy](https://github.com/horsicq/Detect-It-Easy) - A program for
|
||||||
@ -263,7 +262,7 @@ YARA rules.
|
|||||||
analysis platform for suspicious files.
|
analysis platform for suspicious files.
|
||||||
* [Joe Sandbox](https://www.joesecurity.org) - Deep malware analysis with Joe Sandbox.
|
* [Joe Sandbox](https://www.joesecurity.org) - Deep malware analysis with Joe Sandbox.
|
||||||
* [Jotti](https://virusscan.jotti.org/en) - Free online multi-AV scanner.
|
* [Jotti](https://virusscan.jotti.org/en) - Free online multi-AV scanner.
|
||||||
* [Limon](https://github.com/monnappa22/Limon) - Sandbox for Analyzing Linux Malwares
|
* [Limon](https://github.com/monnappa22/Limon) - Sandbox for Analyzing Linux Malware.
|
||||||
* [Malheur](https://github.com/rieck/malheur) - Automatic sandboxed analysis
|
* [Malheur](https://github.com/rieck/malheur) - Automatic sandboxed analysis
|
||||||
of malware behavior.
|
of malware behavior.
|
||||||
* [malsub](https://github.com/diogo-fernan/malsub) - A Python RESTful API framework for
|
* [malsub](https://github.com/diogo-fernan/malsub) - A Python RESTful API framework for
|
||||||
@ -275,7 +274,7 @@ YARA rules.
|
|||||||
* [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static
|
* [MASTIFF Online](https://mastiff-online.korelogic.com/) - Online static
|
||||||
analysis of malware.
|
analysis of malware.
|
||||||
* [Metadefender.com](https://www.metadefender.com) - Scan a file, hash or IP
|
* [Metadefender.com](https://www.metadefender.com) - Scan a file, hash or IP
|
||||||
address for malware (free)
|
address for malware (free).
|
||||||
* [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes
|
* [NetworkTotal](https://www.networktotal.com/index.html) - A service that analyzes
|
||||||
pcap files and facilitates the quick detection of viruses, worms, trojans, and all
|
pcap files and facilitates the quick detection of viruses, worms, trojans, and all
|
||||||
kinds of malware using Suricata configured with EmergingThreats Pro.
|
kinds of malware using Suricata configured with EmergingThreats Pro.
|
||||||
@ -605,9 +604,9 @@ the [browser malware](#browser-malware) section.*
|
|||||||
*Tools for dissecting malware in memory images or running systems.*
|
*Tools for dissecting malware in memory images or running systems.*
|
||||||
|
|
||||||
* [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS
|
* [BlackLight](https://www.blackbagtech.com/blacklight.html) - Windows/MacOS
|
||||||
forensics client supporting hiberfil, pagefile, raw memory analysis
|
forensics client supporting hiberfil, pagefile, raw memory analysis.
|
||||||
* [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
|
* [DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of
|
||||||
Malware in Memory, built on Volatility
|
Malware in Memory, built on Volatility.
|
||||||
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
* [evolve](https://github.com/JamesHabben/evolve) - Web interface for the
|
||||||
Volatility Memory Forensics Framework.
|
Volatility Memory Forensics Framework.
|
||||||
* [FindAES](http://jessekornblum.livejournal.com/269749.html) - Find AES
|
* [FindAES](http://jessekornblum.livejournal.com/269749.html) - Find AES
|
||||||
@ -697,9 +696,9 @@ the [browser malware](#browser-malware) section.*
|
|||||||
* [Practical Malware Analysis](https://amzn.com/dp/1593272901) - The Hands-On
|
* [Practical Malware Analysis](https://amzn.com/dp/1593272901) - The Hands-On
|
||||||
Guide to Dissecting Malicious Software.
|
Guide to Dissecting Malicious Software.
|
||||||
* [Practical Reverse Engineering](https://www.amzn.com/dp/1118787315/) -
|
* [Practical Reverse Engineering](https://www.amzn.com/dp/1118787315/) -
|
||||||
Intermediate Reverse Engineering
|
Intermediate Reverse Engineering.
|
||||||
* [Real Digital Forensics](https://www.amzn.com/dp/0321240693) - Computer
|
* [Real Digital Forensics](https://www.amzn.com/dp/0321240693) - Computer
|
||||||
Security and Incident Response
|
Security and Incident Response.
|
||||||
* [The Art of Memory Forensics](https://amzn.com/dp/1118825098) - Detecting
|
* [The Art of Memory Forensics](https://amzn.com/dp/1118825098) - Detecting
|
||||||
Malware and Threats in Windows, Linux, and Mac Memory.
|
Malware and Threats in Windows, Linux, and Mac Memory.
|
||||||
* [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
|
* [The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
|
||||||
@ -736,8 +735,8 @@ the [browser malware](#browser-malware) section.*
|
|||||||
of commonly used file format (including PE & ELF).
|
of commonly used file format (including PE & ELF).
|
||||||
* [Honeynet Project](http://honeynet.org/) - Honeypot tools, papers, and
|
* [Honeynet Project](http://honeynet.org/) - Honeypot tools, papers, and
|
||||||
other resources.
|
other resources.
|
||||||
* [Kernel Mode](http://www.kernelmode.info/forum/) - An active community devoted to
|
* [Kernel Mode](http://www.kernelmode.info/forum/) - An active community
|
||||||
malware analysis and kernel development.
|
devoted to malware analysis and kernel development.
|
||||||
* [Malicious Software](https://zeltser.com/malicious-software/) - Malware
|
* [Malicious Software](https://zeltser.com/malicious-software/) - Malware
|
||||||
blog and resources by Lenny Zeltser.
|
blog and resources by Lenny Zeltser.
|
||||||
* [Malware Analysis Search](https://cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) -
|
* [Malware Analysis Search](https://cse.google.com/cse/home?cx=011750002002865445766%3Apc60zx1rliu) -
|
||||||
|
Loading…
Reference in New Issue
Block a user