🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 76 lines
    77 77  * [Exploit Database](https://www.exploit-db.com/) - Exploit and shellcode
    78 78   samples.
    79 79  * [Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis.
     80 +* [InQuest Labs](https://labs.inquest.net) - Evergrowing searchable corpus of malicious Microsoft documents.
    80 81  * [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - A resource providing
    81 82   rapid identification and actionable context for malware investigations.
    82 83  * [Malshare](https://malshare.com) - Large repository of malware actively
    skipped 92 lines
    175 176  * [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
    176 177  * [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
    177 178  * [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
     179 +* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
     180 +* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
    178 181  * [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
    179 182   searchable incident database, with a web [API](https://dshield.org/api/).
    180 183   ([unofficial Python library](https://github.com/rshipp/python-dshield)).
    skipped 250 lines
    431 434   malware, featuring JScript/WScript support and ActiveX emulation.
    432 435  * [diStorm](http://www.ragestorm.net/distorm/) - Disassembler for analyzing
    433 436   malicious shellcode.
     437 +* [InQuest Deep File Inspection](https://labs.inquest.net/dfi) - Upload common malware lures for Deep File Inspection and heuristical analysis.
    434 438  * [JS Beautifier](http://jsbeautifier.org/) - JavaScript unpacking and deobfuscation.
    435 439  * [JS Deobfuscator](http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/) -
    436 440   Deobfuscate simple Javascript that use eval or document.write to conceal
    skipped 437 lines
Please wait...
Page is in error, reload to recover