Merge pull request #200 from Jabhatt/patch-1

removed 404 links + new tool
This commit is contained in:
Ryan Shipp 2019-11-21 21:30:56 -06:00 committed by GitHub
commit 78aba00cbb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -264,7 +264,6 @@ executables.
Python script for easy searching of the [TotalHash.cymru.com](https://totalhash.cymru.com/) Python script for easy searching of the [TotalHash.cymru.com](https://totalhash.cymru.com/)
database. database.
* [TrID](http://mark0.net/soft-trid-e.html) - File identifier. * [TrID](http://mark0.net/soft-trid-e.html) - File identifier.
* [virustotal-falsepositive-detector](https://github.com/uppusaikiran/virustotal-falsepositive-detector) - A Tool to Analyze Virustotal Reports to Find Potential False Positives based on similarity of Detection Naming.
* [YARA](https://plusvic.github.io/yara/) - Pattern matching tool for * [YARA](https://plusvic.github.io/yara/) - Pattern matching tool for
analysts. analysts.
* [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate * [Yara rules generator](https://github.com/Neo23x0/yarGen) - Generate
@ -380,6 +379,7 @@ executables.
accounts. accounts.
* [PhishStats](https://phishstats.info/) - Phishing Statistics with search for * [PhishStats](https://phishstats.info/) - Phishing Statistics with search for
IP, domain and website title IP, domain and website title
* [Spyse](https://spyse.com/) - subdomains, whois, realted domains, DNS, hosts AS, SSL/TLS info,
* [SecurityTrails](https://securitytrails.com/) - Historical and current WHOIS, * [SecurityTrails](https://securitytrails.com/) - Historical and current WHOIS,
historical and current DNS records, similar domains, certificate information historical and current DNS records, similar domains, certificate information
and other domain and IP related API and tools. and other domain and IP related API and tools.
@ -440,9 +440,6 @@ the [browser malware](#browser-malware) section.*
malicious shellcode. malicious shellcode.
* [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis. * [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis.
* [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation. * [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation.
* [JS Deobfuscator](http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/) -
Deobfuscate simple Javascript that use eval or document.write to conceal
its code.
* [libemu](http://libemu.carnivore.it/) - Library and tools for x86 shellcode * [libemu](http://libemu.carnivore.it/) - Library and tools for x86 shellcode
emulation. emulation.
* [malpdfobj](https://github.com/9b/malpdfobj) - Deconstruct malicious PDFs * [malpdfobj](https://github.com/9b/malpdfobj) - Deconstruct malicious PDFs