| skipped 76 lines |
77 | 77 | | * [Exploit Database](https://www.exploit-db.com/) - Exploit and shellcode |
78 | 78 | | samples. |
79 | 79 | | * [Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis. |
| 80 | + | * [InQuest Labs](https://labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents. |
80 | 81 | | * [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - A resource providing |
81 | 82 | | rapid identification and actionable context for malware investigations. |
82 | 83 | | * [Malshare](https://malshare.com) - Large repository of malware actively |
| skipped 92 lines |
175 | 176 | | * [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation. |
176 | 177 | | * [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol. |
177 | 178 | | * [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service. |
| 179 | + | * [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources. |
| 180 | + | * [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter. |
178 | 181 | | * [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and |
179 | 182 | | searchable incident database, with a web [API](https://dshield.org/api/). |
180 | 183 | | ([unofficial Python library](https://github.com/rshipp/python-dshield)). |
| skipped 249 lines |
430 | 433 | | malware, featuring JScript/WScript support and ActiveX emulation. |
431 | 434 | | * [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing |
432 | 435 | | malicious shellcode. |
| 436 | + | * [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis. |
433 | 437 | | * [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation. |
434 | 438 | | * [JS Deobfuscator](http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/) - |
435 | 439 | | Deobfuscate simple Javascript that use eval or document.write to conceal |
| skipped 437 lines |