From ee3f68cc05e52d81346ff4e1fe116b0eb599c93a Mon Sep 17 00:00:00 2001 From: rshipp Date: Thu, 26 May 2016 13:35:48 -0600 Subject: [PATCH] Capitalize the first word in descriptions --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index e512184..5d8de62 100644 --- a/README.md +++ b/README.md @@ -211,8 +211,8 @@ A curated list of awesome malware analysis tools and resources. Inspired by ## Online Scanners and Sandboxes *Web-based multi-AV scanners, and malware sandboxes for automated analysis.* -* [APK Analyzer](https://www.apk-analyzer.net/) - free dynamic analysis of APKs. -* [AndroTotal](https://andrototal.org/) - free online analysis of APKs +* [APK Analyzer](https://www.apk-analyzer.net/) - Free dynamic analysis of APKs. +* [AndroTotal](https://andrototal.org/) - Free online analysis of APKs against multiple mobile antivirus apps. * [Anubis](https://anubis.iseclab.org/) - Malware Analysis for Unknown Binaries and Site Check. @@ -226,10 +226,10 @@ A curated list of awesome malware analysis tools and resources. Inspired by legal concerns by the author. * [DeepViz](https://www.deepviz.com/) - Multi-format file analyzer with machine-learning classification. -* [Document Analyzer](https://www.document-analyzer.net/) - free dynamic analysis of DOC and PDF files. +* [Document Analyzer](https://www.document-analyzer.net/) - Free dynamic analysis of DOC and PDF files. * [DRAKVUF](https://github.com/tklengyel/drakvuf) - Dynamic malware analysis system. -* [File Analyzer](https://www.file-analyzer.net/) - free dynamic analysis of PE files. +* [File Analyzer](https://www.file-analyzer.net/) - Free dynamic analysis of PE files. * [Hybrid Analysis](https://www.hybrid-analysis.com/) - Online malware analysis tool, powered by VxSandbox. * [IRMA](http://irma.quarkslab.com/) - An asynchronous and customizable @@ -251,7 +251,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by script for safely uploading binaries to sandbox sites. * [SEE](https://github.com/F-Secure/see) - Sandboxed Execution Environment (SEE) is a framework for building test automation in secured Environments. -* [URL Analyzer](https://www.url-analyzer.net/) - free dynamic analysis of URL files. +* [URL Analyzer](https://www.url-analyzer.net/) - Free dynamic analysis of URL files. * [VirusTotal](https://www.virustotal.com/) - Free online analysis of malware samples and URLs * [Zeltser's List](https://zeltser.com/automated-malware-analysis/) - Free