From f675e8dcf15c5771e63d034aaf17791632daa3df Mon Sep 17 00:00:00 2001 From: DSR! Date: Fri, 3 Mar 2023 01:49:52 -0300 Subject: [PATCH] Update docs --- CHANGELOG.md | 4 +++- README.ES.md | 2 +- README.md | 2 +- README.zh_CN.md | 2 +- TOOLS.md | 5 ----- 5 files changed, 6 insertions(+), 9 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index aada17a..e68ad1b 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,7 +1,7 @@ # Changelog -## 2023.3 - MASTER +## 2023.3 - Fri 3, 2023 ### Added @@ -17,6 +17,7 @@ ### Changed +- Update tools (01/03/2023) - Bump Universal Updater to 1.8.0 - Extract all old tools to new package - New Reverse catalog created to improve the ordering of tools @@ -31,6 +32,7 @@ ### Removed - Drop Immunity Debugger +- Drop ExeExplorer ## 2023.1 - Jan 5, 2023 diff --git a/README.ES.md b/README.ES.md index 322c55c..cde31a7 100644 --- a/README.ES.md +++ b/README.ES.md @@ -33,7 +33,7 @@ El mismo está en la carpeta `bin\updater\updater.exe`. ## Herramientas -El toolkit está compuesto por 91 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis.
+El toolkit está compuesto por 90 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis.
Las herramientas están todas descargadas de sus páginas oficiales pero de todas formas se recomienda usarlas con cautela, en especial las que las paginas oficiales son hilos en foros y ese tipo de cosas.
Para ver la lista completa de herramientas puedes [hacerlo aqui](TOOLS.md). diff --git a/README.md b/README.md index dd959f0..3436f69 100644 --- a/README.md +++ b/README.md @@ -32,7 +32,7 @@ You will find the binary in the folder `bin\updater\updater.exe`. ## Tool set -This toolkit is composed by 91 apps that cover everything we might need to perform reverse engineering and binary/malware analysis.
+This toolkit is composed by 90 apps that cover everything we might need to perform reverse engineering and binary/malware analysis.
Every tool has been downloaded from their original/official websites, but we still recommend you to use them with caution, specially those tools whose official pages are forum threads. Always exercise common sense.
You can check the complete list of tools [here](TOOLS.md). diff --git a/README.zh_CN.md b/README.zh_CN.md index 13ea3d1..25cf19a 100644 --- a/README.zh_CN.md +++ b/README.zh_CN.md @@ -30,7 +30,7 @@ ## 工具集 -这个工具包由 91 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。
+这个工具包由 90 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。
每个工具都是从他们的原发布地址/官网下载的,但是我们还是建议大家谨慎使用,尤其是那些官方页面是论坛线程的工具。经常运用常识。
您可以在 [here](TOOLS.md) 查看完整的工具列表。 diff --git a/TOOLS.md b/TOOLS.md index f3e680e..f6ea6c4 100644 --- a/TOOLS.md +++ b/TOOLS.md @@ -29,11 +29,6 @@ ***Developer:*** Hors
***Description:*** Detect It Easy, or abbreviated "DIE" is a program for determining types of files. DIE-Engine is a Graphical User Interface for DIE.
-### Exe Explorer -***Web:*** https://www.mitec.cz/exe.html
-***Developer:*** Michal Multi
-***Description:*** It reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too. It contains powerful Resource Viewer that is able to abalyze and display al basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY.
- ### ExeinfoPe ***Web:*** https://github.com/ExeinfoASL/ASL
***Developer:*** ASL - http://www.exeinfo.byethost18.com