mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-10-01 06:35:40 -04:00
Merge pull request #194 from pedramamini/master
Added a variety of open resources from InQuest.net
This commit is contained in:
commit
964740ab02
@ -77,6 +77,7 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
|
||||
* [Exploit Database](https://www.exploit-db.com/) - Exploit and shellcode
|
||||
samples.
|
||||
* [Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis.
|
||||
* [InQuest Labs](https://labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents.
|
||||
* [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - A resource providing
|
||||
rapid identification and actionable context for malware investigations.
|
||||
* [Malshare](https://malshare.com) - Large repository of malware actively
|
||||
@ -175,6 +176,8 @@ View Chinese translation: [恶意软件分析大合集.md](恶意软件分析大
|
||||
* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
|
||||
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
|
||||
* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
|
||||
* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
|
||||
* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
|
||||
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
|
||||
searchable incident database, with a web [API](https://dshield.org/api/).
|
||||
([unofficial Python library](https://github.com/rshipp/python-dshield)).
|
||||
@ -431,6 +434,7 @@ the [browser malware](#browser-malware) section.*
|
||||
malware, featuring JScript/WScript support and ActiveX emulation.
|
||||
* [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing
|
||||
malicious shellcode.
|
||||
* [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis.
|
||||
* [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation.
|
||||
* [JS Deobfuscator](http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/) -
|
||||
Deobfuscate simple Javascript that use eval or document.write to conceal
|
||||
|
Loading…
Reference in New Issue
Block a user