-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
/
run_awesome_bot.sh
executable file
·48 lines (44 loc) · 2.41 KB
/
run_awesome_bot.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
#!/usr/bin/env bash
set -euo pipefail
DEAD_URLS='opencollective.com','http://copperdroid.isg.rhul.ac.uk/copperdroid/',\
'http://sanddroid.xjtu.edu.cn/','http://www.foresafe.com/scan',\
'https://github.com/BaiduSecurityLabs/ZjDroid','https://github.com/yangbean9/ZjDroid',\
'https://appanalysis.org/download.html','https://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/',\
'https://dexter.dexlabs.org/','http://www.mobiseclab.org/eacus.jsp','https://fireeye.ijinshan.com/',\
'http://www.comdroid.org/','http://www.androidsandbox.net/','http://andrototal.org',\
'http://www.mobile-app-insight.org','http://anubis.iseclab.org/',\
'http://blog.avlyun.com/wp-content/uploads/2014/04/SmaliViewer.zip',\
'habo.qq.com','http://admire.necst.it/','http://tracedroid.few.vu.nl',\
'http://appanalysis.org','http://dunkelheit.com.br','https://mobile-security.zeef.com',\
'https://redmine.honeynet.org/projects/are/wiki','https://www.visualthreat.com/',\
'http://www.mobilemalware.com.br','https://appscan.bluemix.net',\
'http://siis.cse.psu.edu/tools.html','http://siis.cse.psu.edu/dare/index.html',\
'http://codekiem.com/2012/02/24/apk-downloader/','https://apkscan.nviso.be',\
'http://ww38.xchg.info','https://thecobraden.com/projects/cobradroid',\
'https://bitbucket.org/mstrobel/procyon/wiki/',\
'https://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares',\
'https://github.com/ashishb/android-security-awesome/actions',\
'https://appcritique.boozallen.com',\
'https://amaaas.com',\
'https://malwarepot.com/index.php/AMAaaS',\
'https://androidtamer.com/',\
'https://kb.androidtamer.com/Device_Security_Patch_tracker/',\
'http://undroid.av-comparatives.info/',\
'https://github.com/EugenioDelfa/Smali-CFGs',\
'https://malab.bitbaan.com/',\
'https://www.android-device-security.org/client/datatable',\
'http://pralab.diee.unica.it/en/AndroidPRAGuardDataset',\
'https://www.nccgroup.trust/us/about-us/resources/intent-fuzzer/',\
'https://www.sec.tu-bs.de/~danarp/drebin/',\
'https://apkpure.com',\
'https://approver.talos-sec.com',\
'https://wiki.sei.cmu.edu/confluence/display/android/Android+Secure+Coding+Standard',\
'https://web.archive.org/web/20180721134044/http://www.fasteque.com:80/android-reverse-engineering-101-part-1/'
FLAKY_URLS='http://safe.ijiami.cn/',\
'https://apkcombo.com/apk-downloader/',\
SRC_FILE=README.md
# Install urlsup with `cargo install urlsup`
urlsup \
--allow 301,302 \
--white-list ${DEAD_URLS},${FLAKY_URLS} \
${SRC_FILE}