Skip to content

Commit

Permalink
Mark more links as dead
Browse files Browse the repository at this point in the history
  • Loading branch information
ashishb committed Aug 4, 2023
1 parent 18bd6db commit 23e3295
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 3 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -167,13 +167,13 @@ A collection of Android security-related resources.

### Fuzz Testing

1. [IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)
1. [Radamsa Fuzzer](https://github.com/anestisb/radamsa-android)
1. [Honggfuzz](https://github.com/google/honggfuzz)
1. [An Android port of the Melkor ELF fuzzer](https://github.com/anestisb/melkor-android)
1. [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA)
1. [AndroFuzz](https://github.com/jonmetz/AndroFuzz)
1. [QuarksLab's Android Fuzzing](https://github.com/quarkslab/android-fuzzing)
1. ~~[IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)~~

### App Repackaging Detectors

Expand Down Expand Up @@ -259,8 +259,8 @@ A collection of Android security-related resources.
1. [Drebin](https://www.sec.tu-bs.de/~danarp/drebin/)
1. [Kharon Malware Dataset](http://kharon.gforge.inria.fr/dataset/) - 7 malware which have been reverse-engineered and documented
1. [Android Adware and General Malware Dataset](https://www.unb.ca/cic/datasets/android-adware.html)
1. [Android PRAGuard Dataset](http://pralab.diee.unica.it/en/AndroidPRAGuardDataset) - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.
1. [AndroZoo](https://androzoo.uni.lu/) - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
1. ~~[Android PRAGuard Dataset](http://pralab.diee.unica.it/en/AndroidPRAGuardDataset) - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.~~
1. ~~[Admire](http://admire.necst.it/)~~

### Bounty Programs
Expand Down
4 changes: 3 additions & 1 deletion run_awesome_bot.sh
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,9 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
'http://undroid.av-comparatives.info/',\
'https://github.com/EugenioDelfa/Smali-CFGs',\
'https://malab.bitbaan.com/',\
'https://www.android-device-security.org/client/datatable'
'https://www.android-device-security.org/client/datatable',\
'http://pralab.diee.unica.it/en/AndroidPRAGuardDataset',\
'https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/'

FLAKY_URLS='http://safe.ijiami.cn/',\
'https://apkcombo.com/apk-downloader/',\
Expand Down

0 comments on commit 23e3295

Please sign in to comment.