mirror of
https://github.com/mave12/awesome-malware-resources
synced 2024-06-28 11:31:07 +00:00
Update README.md
This commit is contained in:
parent
949466acc6
commit
5bb12a8e06
20
README.md
20
README.md
@ -2,7 +2,6 @@
|
||||
Just another collection of links, tools, reports and other stuff
|
||||
|
||||
# Table of Contents
|
||||
|
||||
* [Malware Reports
|
||||
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#malware-reports)
|
||||
* [Infostealer / Banking Malware
|
||||
@ -61,6 +60,8 @@ Just another collection of links, tools, reports and other stuff
|
||||
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#regretlocker)
|
||||
* [HelloKitty
|
||||
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#hellokitty)
|
||||
* [DearCry
|
||||
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#dearcry)
|
||||
* [APT
|
||||
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#apt)
|
||||
* [Tutorials
|
||||
@ -328,6 +329,10 @@ Daniel Bunce (0verfl0w_) - SentinelOne
|
||||
|
||||
### REvil
|
||||
|
||||
[2021]
|
||||
|
||||
* [The DFIR Report - Sodinokibi (aka REvil) Ransomware](https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/)
|
||||
|
||||
[2020]
|
||||
|
||||
* [German users targeted with Gootkit banker or REvil ransomware ](https://blog.malwarebytes.com/threat-analysis/2020/11/german-users-targeted-with-gootkit-banker-or-revil-ransomware/)
|
||||
@ -357,7 +362,7 @@ Daniel Bunce (0verfl0w_) - SentinelOne
|
||||
|
||||
[2020]
|
||||
|
||||
* [RegretLocker Ransomware Analysis by Chuong Dong](http://chuongdong.com/reverse engineering/2020/11/17/RegretLocker/)
|
||||
* [RegretLocker Ransomware Analysis by Chuong Dong](http://chuongdong.com/reverse%20engineering/2020/11/17/RegretLocker/)
|
||||
|
||||
### HelloKitty
|
||||
|
||||
@ -365,6 +370,14 @@ Daniel Bunce (0verfl0w_) - SentinelOne
|
||||
|
||||
* [HelloKitty Ransomware Lacks Stealth, But Still Strikes Home](https://labs.sentinelone.com/hellokitty-ransomware-lacks-stealth-but-still-strikes-home/)
|
||||
|
||||
### DearCry
|
||||
|
||||
[2021]
|
||||
|
||||
* [Internals of DearCry Ransomware !](https://0xthreatintel.medium.com/internals-of-dearcry-ransomware-507b84ae9ba8)
|
||||
* [
|
||||
DearCry ransomware attacks exploit Exchange server vulnerabilities](https://news.sophos.com/en-us/2021/03/15/dearcry-ransomware-attacks-exploit-exchange-server-vulnerabilities/)
|
||||
|
||||
## APT
|
||||
|
||||
* [Dissecting APT21 samples using a step-by-step approach](https://cybergeeks.tech/dissecting-apt21-samples-using-a-step-by-step-approach/)
|
||||
@ -382,7 +395,8 @@ Daniel Bunce (0verfl0w_) - SentinelOne
|
||||
|
||||
### Courses
|
||||
|
||||
[Zero2Auto - Vitali Kremez, Overflow](https://courses.zero2auto.com)
|
||||
* [Zero2Auto - Vitali Kremez, Overflow](https://courses.zero2auto.com)
|
||||
* [Hasherezade - Malware Training Vol1](https://github.com/hasherezade/malware_training_vol1)
|
||||
|
||||
### Overview of Malware Techniques
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user