From ec128aef1869b6835da360e69481637dc6f57e8e Mon Sep 17 00:00:00 2001 From: rshipp Date: Sat, 9 May 2015 10:41:13 -0600 Subject: [PATCH] Rearrange TOC, add @radare 2 --- README.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index f355398..c0bd7b3 100644 --- a/README.md +++ b/README.md @@ -15,10 +15,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by - [Documents and Shellcode](#documents-and-shellcode) - [File Carving](#file-carving) - [Deobfuscation](#deobfuscation) - - [Static Executable Analysis](#static-executable-analysis) - - [Windows Binaries](#windows-binaries) - - [Linux Binaries](#linux-binaries) - - [Debugging](#debugging) + - [Debugging and Reverse Engineering](#debugging-and-reverse-engineering) - [Network](#network) - [Memory Forensics](#memory-forensics) - [Miscellaneous](#miscellaneous) @@ -141,6 +138,11 @@ A curated list of awesome malware analysis tools and resources. Inspired by * [Spidermonkey](https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey) - Mozilla's JavaScript engine, for debugging malicious JS. +## Debugging and Reverse Engineering + +* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with + debugger support. + ## Memory Forensics *Tools for dissecting malware in memory images or running systems.*