Skip to content

Commit 23e3295

Browse files
committed
Mark more links as dead
1 parent 18bd6db commit 23e3295

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,13 +167,13 @@ A collection of Android security-related resources.
167167

168168
### Fuzz Testing
169169

170-
1. [IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)
171170
1. [Radamsa Fuzzer](https://github.com/anestisb/radamsa-android)
172171
1. [Honggfuzz](https://github.com/google/honggfuzz)
173172
1. [An Android port of the Melkor ELF fuzzer](https://github.com/anestisb/melkor-android)
174173
1. [Media Fuzzing Framework for Android](https://github.com/fuzzing/MFFA)
175174
1. [AndroFuzz](https://github.com/jonmetz/AndroFuzz)
176175
1. [QuarksLab's Android Fuzzing](https://github.com/quarkslab/android-fuzzing)
176+
1. ~~[IntentFuzzer](https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/)~~
177177

178178
### App Repackaging Detectors
179179

@@ -259,8 +259,8 @@ A collection of Android security-related resources.
259259
1. [Drebin](https://www.sec.tu-bs.de/~danarp/drebin/)
260260
1. [Kharon Malware Dataset](http://kharon.gforge.inria.fr/dataset/) - 7 malware which have been reverse-engineered and documented
261261
1. [Android Adware and General Malware Dataset](https://www.unb.ca/cic/datasets/android-adware.html)
262-
1. [Android PRAGuard Dataset](http://pralab.diee.unica.it/en/AndroidPRAGuardDataset) - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.
263262
1. [AndroZoo](https://androzoo.uni.lu/) - AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market.
263+
1. ~~[Android PRAGuard Dataset](http://pralab.diee.unica.it/en/AndroidPRAGuardDataset) - The dataset contains 10479 samples, obtained by obfuscating the MalGenome and the Contagio Minidump datasets with seven different obfuscation techniques.~~
264264
1. ~~[Admire](http://admire.necst.it/)~~
265265

266266
### Bounty Programs

run_awesome_bot.sh

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,9 @@ DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',
2929
'http://undroid.av-comparatives.info/',\
3030
'https://github.com/EugenioDelfa/Smali-CFGs',\
3131
'https://malab.bitbaan.com/',\
32-
'https://www.android-device-security.org/client/datatable'
32+
'https://www.android-device-security.org/client/datatable',\
33+
'http://pralab.diee.unica.it/en/AndroidPRAGuardDataset',\
34+
'https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/'
3335

3436
FLAKY_URLS='http://safe.ijiami.cn/',\
3537
'https://apkcombo.com/apk-downloader/',\

0 commit comments

Comments
 (0)