Skip to content

Commit

Permalink
adds more 3rd party resources to the readme
Browse files Browse the repository at this point in the history
  • Loading branch information
huettenhain committed Nov 28, 2024
1 parent 8ad1661 commit 7aeec63
Showing 1 changed file with 20 additions and 6 deletions.
26 changes: 20 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,18 +30,32 @@ but also contains the specification for the three fundamental concepts of the to
[framing][frame], [multibin arguments][argformats], and [meta variables][meta].
Full-text search of the description and help text for every unit is also available on the command line,
via the provided `binref` command. In recognition of the fact that reference documentation can be somewhat dry,
there is an ongoing effort to produce a series of [tutorials](tutorials) and there are a few additional resources:
there is an ongoing effort to produce a series of [tutorials](tutorials); I very much recommend to check them out.
On top of that, I collect additional resources (including some produced by third parties) below.

- (2021/08) [OALabs](https://www.youtube.com/c/OALabs) was kind enough to let me
> [!NOTE]
> Refinery is still in alpha and the interface can sometimes change,
> i.e. units and parameters can be removed or renamed.
> Hence, it can happen that specific command lines from older videos and blog posts don't work any more.
- [`2021/08`] [OALabs](https://www.youtube.com/c/OALabs)
was kind enough to let me
[demo the toolkit in a feature video](https://www.youtube.com/watch?v=4gTaGfFyMK4).
In the video, I essentially work through the contents of
[the first tutorial](tutorials/tbr-files.v0x01.netwalker.dropper.ipynb).
- (2021/11) [Johannes Bader](https://bin.re/) wrote an amazing
- [`2021/11`] [Johannes Bader](https://bin.re/)
wrote an amazing
[blog post](https://bin.re/blog/analysing-ta551-malspam-with-binary-refinery/)
about how to analyze TA551 malspam with binary refinery.
- (2024/11) [the CyberYeti](https://www.youtube.com/@jstrosch) had me
about how to analyze malicious spam with binary refinery.
- [`2024/03`] [Malware Analysis For Hedgehogs](https://www.youtube.com/@MalwareAnalysisForHedgehogs)
made
[a video about unpacking an XWorm sample](https://www.youtube.com/watch?v=5ZtmYNmVMKo)
using refinery.
- [`2024/11`] [the CyberYeti](https://www.youtube.com/@jstrosch)
had me
[on stream presenting refinery](https://www.youtube.com/live/-B072w0qjNk).
Showcases again include samples from the example section below and the [tutorials](tutorials).
Showcases again include samples from the example section below and the
[tutorials](tutorials).

## License

Expand Down

0 comments on commit 7aeec63

Please sign in to comment.