Fix more issues

This commit is contained in:
Herman Slatman 2020-10-01 20:23:26 +02:00
parent a8edbadbb7
commit 6bdc38d371
No known key found for this signature in database
GPG Key ID: F4D8A44EA0A75A4F
2 changed files with 5 additions and 5 deletions

View File

@ -4,4 +4,4 @@ rvm:
before_script: before_script:
- gem install awesome_bot - gem install awesome_bot
script: script:
- awesome_bot README.md --white-list CONTRIBUTING.md,http://osint.bambenekconsulting.com/feeds/c2-ipmasterlist.txt,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://cryptome.org/2015/09/cti-guide.pdf,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com --allow-ssl --allow-redirect - awesome_bot README.md --white-list CONTRIBUTING.md,http://osint.bambenekconsulting.com/feeds/c2-ipmasterlist.txt,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://cryptome.org/2015/09/cti-guide.pdf,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com,http://example.com --allow-ssl --allow-redirect

View File

@ -232,7 +232,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
<a href="https://feodotracker.abuse.ch/" target="_blank">ZeuS Tracker</a> <a href="https://feodotracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
</td> </td>
<td> <td>
The Feodo Tracker <a href="https://www.abuse.ch/" target="_blank">abuse.ch</a> tracks the Feodo trojan. The Feodo Tracker <a href="https://abuse.ch/" target="_blank">abuse.ch</a> tracks the Feodo trojan.
</td> </td>
</tr> </tr>
<tr> <tr>
@ -581,7 +581,7 @@ The primary goal of Malpedia is to provide a resource for rapid identification a
<a href="https://zeustracker.abuse.ch/" target="_blank">ZeuS Tracker</a> <a href="https://zeustracker.abuse.ch/" target="_blank">ZeuS Tracker</a>
</td> </td>
<td> <td>
The ZeuS Tracker by <a href="https://www.abuse.ch/" target="_blank">abuse.ch</a> tracks ZeuS Command & Control servers (hosts) around the world and provides you a domain- and a IP-blocklist. The ZeuS Tracker by <a href="https://abuse.ch/" target="_blank">abuse.ch</a> tracks ZeuS Command & Control servers (hosts) around the world and provides you a domain- and a IP-blocklist.
</td> </td>
</tr> </tr>
<tr> <tr>
@ -1035,7 +1035,7 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
<a href="https://bitbucket.org/camp0/aiengine" target="_blank">AIEngine</a> <a href="https://bitbucket.org/camp0/aiengine" target="_blank">AIEngine</a>
</td> </td>
<td> <td>
AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others. Source available on <a href="https://bitbucket.org/camp0/aiengine" target="_blank">Bitbucket</a>. AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others.
</td> </td>
</tr> </tr>
<tr> <tr>
@ -1734,7 +1734,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511" target="_blank">Structured Analytic Techniques For Intelligence Analysis</a> <a href="https://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511" target="_blank">Structured Analytic Techniques For Intelligence Analysis</a>
</td> </td>
<td> <td>
This book contains methods that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis. This book contains methods that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis.