Update render script and Makefile

This commit is contained in:
Jonas Zeunert
2024-04-22 21:54:39 +02:00
parent 2d63fe63cd
commit 4d0cd768f7
10975 changed files with 47095 additions and 4031084 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Malware Analysis !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
 Awesome Malware Analysis !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
A curated list of awesome malware analysis tools and resources. Inspired by
awesome-python (https://github.com/vinta/awesome-python) and
@@ -35,7 +35,7 @@
View Chinese translation: 恶意软件分析大合集.md (恶意软件分析大合集.md).
―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
Malware Collection
@@ -63,8 +63,8 @@
⟡ Honeyd (http://www.honeyd.org/) - Create a virtual honeynet.
⟡ HoneyDrive (http://bruteforcelab.com/honeydrive) - Honeypot bundle Linux distro.
⟡ Honeytrap (https://github.com/honeytrap/honeytrap) - Opensource system for running, monitoring and managing honeypots.
⟡ MHN (https://github.com/pwnlandia/mhn) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a 
neat web interface.
⟡ MHN (https://github.com/pwnlandia/mhn) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data 
immediately, viewable from a neat web interface.
⟡ Mnemosyne (https://github.com/johnnykv/mnemosyne) - A normalizer for
 honeypot data; supports Dionaea.
⟡ Thug (https://github.com/buffer/thug) - Low interaction honeyclient, for
@@ -182,8 +182,8 @@
 Country Maps, Age of IPs listed, Retention Policy, Overlaps.
⟡ HoneyDB (https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
⟡ hpfeeds (https://github.com/rep/hpfeeds) - Honeypot feed protocol.
⟡ Infosec - CERT-PA lists (https://infosec.cert-pa.it/analyze/statistics.html) (IPs (https://infosec.cert-pa.it/analyze/listip.txt) - Domains (https://infosec.cert-pa.it/analyze/listdomains.txt) - URLs 
(https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
⟡ Infosec - CERT-PA lists (https://infosec.cert-pa.it/analyze/statistics.html) (IPs (https://infosec.cert-pa.it/analyze/listip.txt) - Domains 
(https://infosec.cert-pa.it/analyze/listdomains.txt) - URLs (https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
⟡ InQuest REPdb (https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
⟡ InQuest IOCdb (https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
⟡ Internet Storm Center (DShield) (https://isc.sans.edu/) - Diary and
@@ -650,8 +650,8 @@
 for x86 and x86_64.
⟡ Vivisect (https://github.com/vivisect/vivisect) - Python tool for
 malware analysis.
⟡ WinDbg (https://developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device 
drivers, and the kernel-mode memory dumps.
⟡ WinDbg (https://developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode 
applications, device drivers, and the kernel-mode memory dumps.
⟡ X64dbg (https://github.com/x64dbg/) - An open-source x64/x32 debugger for windows.
Network
@@ -803,18 +803,18 @@
⟡ Santoku Linux (https://santoku-linux.com/) - Linux distribution for mobile
 forensics, malware analysis, and security.
 Resources
 Resources
Books
Essential malware analysis reading material.
⟡ Learning Malware Analysis
 (https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware
⟡ Learning Malware Analysis (https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and
investigate Windows malware
⟡ Malware Analyst's Cookbook and DVD (https://amzn.com/dp/0470613033) -
 Tools and Techniques for Fighting Malicious Code.
⟡ Mastering Malware Analysis
 (https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks
⟡ Mastering Malware Analysis (https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating 
malicious software, APT, cybercime, and IoT attacks
⟡ Mastering Reverse Engineering (https://www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills
⟡ Practical Malware Analysis (https://amzn.com/dp/1593272901) - The Hands-On
 Guide to Dissecting Malicious Software.
@@ -880,7 +880,7 @@
 Related Awesome Lists
 Related Awesome Lists
⟡ Android Security (https://github.com/ashishb/android-security-awesome)
⟡ AppSec (https://github.com/paragonie/awesome-appsec)
@@ -897,12 +897,12 @@
⟡ Threat Intelligence (https://github.com/hslatman/awesome-threat-intelligence)
⟡ YARA (https://github.com/InQuest/awesome-yara)
 Contributing (CONTRIBUTING.md)
 Contributing (CONTRIBUTING.md)
Pull requests and issues with suggestions are welcome! Please read the
CONTRIBUTING (CONTRIBUTING.md) guidelines before submitting a PR.
 Thanks
 Thanks
This list was made possible by: