update lists
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Malware Analysis [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Malware Analysis [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12mA curated list of awesome malware analysis tools and resources. Inspired by[39m
|
||||
[38;5;14m[1mawesome-python[0m[38;5;12m (https://github.com/vinta/awesome-python) and[39m
|
||||
@@ -35,7 +35,7 @@
|
||||
|
||||
[38;5;12mView Chinese translation: [39m[38;5;14m[1m恶意软件分析大合集.md[0m[38;5;12m (恶意软件分析大合集.md).[39m
|
||||
|
||||
[38;5;238m――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
[38;5;238m――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
|
||||
[38;2;255;187;0m[4mMalware Collection[0m
|
||||
|
||||
@@ -61,7 +61,7 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDionaea[0m[38;5;12m (https://github.com/DinoTools/dionaea) - Honeypot designed to trap malware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGlastopf[0m[38;5;12m (https://github.com/mushorg/glastopf) - Web application honeypot.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneyd[0m[38;5;12m (http://www.honeyd.org/) - Create a virtual honeynet.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneyDrive[0m[38;5;12m (http://bruteforcelab.com/honeydrive) - Honeypot bundle Linux distro.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneyDrive[0m[38;5;12m (https://bruteforce.gr/honeydrive/) - Honeypot bundle Linux distro.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneytrap[0m[38;5;12m (https://github.com/honeytrap/honeytrap) - Opensource system for running, monitoring and managing honeypots.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMHN[0m[38;5;12m (https://github.com/pwnlandia/mhn) - MHN is a centralized server for management and data collection of honeypots. MHN allows you to deploy sensors quickly and to collect data immediately, viewable from a neat web interface.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMnemosyne[0m[38;5;12m (https://github.com/johnnykv/mnemosyne) - A normalizer for[39m
|
||||
@@ -74,7 +74,7 @@
|
||||
|
||||
[48;2;30;30;40m[38;5;13m[3mMalware samples collected for analysis.[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mClean MX[0m[38;5;12m (http://support.clean-mx.de/clean-mx/viruses.php) - Realtime[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mClean MX[0m[38;5;12m (http://support.clean-mx.com/clean-mx/viruses.php) - Realtime[39m
|
||||
[38;5;12m database of malware and malicious domains.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mContagio[0m[38;5;12m (http://contagiodump.blogspot.com/) - A collection of recent[39m
|
||||
[38;5;12m malware samples and analyses.[39m
|
||||
@@ -87,8 +87,6 @@
|
||||
[38;5;12m rapid identification and actionable context for malware investigations.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMalshare[0m[38;5;12m (https://malshare.com) - Large repository of malware actively[39m
|
||||
[38;5;12m scrapped from malicious sites.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Malware Project[0m[38;5;12m (http://openmalware.org/) - Sample information and[39m
|
||||
[38;5;12m downloads. Formerly Offensive Computing.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRagpicker[0m[38;5;12m (https://github.com/robbyFux/Ragpicker) - Plugin based malware[39m
|
||||
[38;5;12m crawler with pre-analysis and reporting functionalities[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtheZoo[0m[38;5;12m (https://github.com/ytisf/theZoo) - Live malware samples for[39m
|
||||
@@ -304,6 +302,7 @@
|
||||
[38;5;12m traffic analysis of Linux malwares and capturing IOCs.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDRAKVUF[0m[38;5;12m (https://github.com/tklengyel/drakvuf) - Dynamic malware analysis[39m
|
||||
[38;5;12m system.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfilescan.io[0m[38;5;12m (https://www.filescan.io/) - Static malware analysis, VBA/Powershell/VBS/JS Emulation [39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfirmware.re[0m[38;5;12m (http://firmware.re/) - Unpacks, scans and analyzes almost any[39m
|
||||
[38;5;12m firmware package.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHaboMalHunter[0m[38;5;12m (https://github.com/Tencent/HaboMalHunter) - An Automated Malware[39m
|
||||
@@ -649,8 +648,7 @@
|
||||
[38;5;12m for x86 and x86_64.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVivisect[0m[38;5;12m (https://github.com/vivisect/vivisect) - Python tool for[39m
|
||||
[38;5;12m malware analysis.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWinDbg[0m[38;5;12m [39m[38;5;12m(https://developer.microsoft.com/en-us/windows/hardware/download-windbg)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mmultipurpose[39m[38;5;12m [39m[38;5;12mdebugger[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12moperating[39m[38;5;12m [39m[38;5;12msystem,[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdebug[39m[38;5;12m [39m[38;5;12muser[39m[38;5;12m [39m[38;5;12mmode[39m[38;5;12m [39m[38;5;12mapplications,[39m[38;5;12m [39m[38;5;12mdevice[39m[38;5;12m [39m[38;5;12mdrivers,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mkernel-mode[39m[38;5;12m [39m
|
||||
[38;5;12mmemory[39m[38;5;12m [39m[38;5;12mdumps.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWinDbg[0m[38;5;12m (https://developer.microsoft.com/en-us/windows/hardware/download-windbg) - multipurpose debugger for the Microsoft Windows computer operating system, used to debug user mode applications, device drivers, and the kernel-mode memory dumps.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mX64dbg[0m[38;5;12m (https://github.com/x64dbg/) - An open-source x64/x32 debugger for windows.[39m
|
||||
|
||||
[38;2;255;187;0m[4mNetwork[0m
|
||||
@@ -802,7 +800,7 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSantoku Linux[0m[38;5;12m (https://santoku-linux.com/) - Linux distribution for mobile[39m
|
||||
[38;5;12m forensics, malware analysis, and security.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mResources[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mResources[0m
|
||||
|
||||
[38;2;255;187;0m[4mBooks[0m
|
||||
|
||||
@@ -811,8 +809,7 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLearning Malware Analysis[0m[38;5;12m (https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMalware Analyst's Cookbook and DVD[0m[38;5;12m (https://amzn.com/dp/0470613033) -[39m
|
||||
[38;5;12m Tools and Techniques for Fighting Malicious Code.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMastering Malware Analysis[0m
|
||||
[38;5;12m (https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMastering Malware Analysis[0m[38;5;12m (https://www.packtpub.com/networking-and-servers/mastering-malware-analysis) - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMastering Reverse Engineering[0m[38;5;12m (https://www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPractical Malware Analysis[0m[38;5;12m (https://amzn.com/dp/1593272901) - The Hands-On[39m
|
||||
[38;5;12m Guide to Dissecting Malicious Software.[39m
|
||||
@@ -878,11 +875,12 @@
|
||||
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mRelated Awesome Lists[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mRelated Awesome Lists[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Security[0m[38;5;12m (https://github.com/ashishb/android-security-awesome)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAppSec[0m[38;5;12m (https://github.com/paragonie/awesome-appsec)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTFs[0m[38;5;12m (https://github.com/apsdehal/awesome-ctf)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExecutable Packing[0m[38;5;12m (https://github.com/dhondta/awesome-executable-packing)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mForensics[0m[38;5;12m (https://github.com/Cugu/awesome-forensics)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1m"Hacking"[0m[38;5;12m (https://github.com/carpedm20/awesome-hacking)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneypots[0m[38;5;12m (https://github.com/paralax/awesome-honeypots)[39m
|
||||
@@ -895,12 +893,12 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThreat Intelligence[0m[38;5;12m (https://github.com/hslatman/awesome-threat-intelligence)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mYARA[0m[38;5;12m (https://github.com/InQuest/awesome-yara)[39m
|
||||
|
||||
[38;5;12m [39m[38;5;14m[1m[4mContributing[0m[38;2;255;187;0m[1m[4m (CONTRIBUTING.md)[0m
|
||||
[38;5;12m [39m[38;5;14m[1m[4mContributing[0m[38;2;255;187;0m[1m[4m (CONTRIBUTING.md)[0m
|
||||
|
||||
[38;5;12mPull requests and issues with suggestions are welcome! Please read the[39m
|
||||
[38;5;14m[1mCONTRIBUTING[0m[38;5;12m (CONTRIBUTING.md) guidelines before submitting a PR.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mThanks[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mThanks[0m
|
||||
|
||||
[38;5;12mThis list was made possible by:[39m
|
||||
|
||||
@@ -912,3 +910,5 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;12mAnd everyone else who has sent pull requests or suggested links to add here![39m
|
||||
|
||||
[38;5;12mThanks![39m
|
||||
|
||||
[38;5;12mmalwareanalysis Github: https://github.com/rshipp/awesome-malware-analysis[39m
|
||||
|
||||
Reference in New Issue
Block a user