From d71d485ad23d4db41b502e89812dfef10254b886 Mon Sep 17 00:00:00 2001 From: Owais Date: Thu, 7 Mar 2024 18:07:08 +0530 Subject: [PATCH] Fixed the broken links --- database/cybersecurity/defensive_security.json | 2 +- database/cybersecurity/malware_analysis.json | 8 ++++---- database/cybersecurity/web_application_security.json | 4 ++-- database/frontend/ui-generators.json | 4 ++-- 4 files changed, 9 insertions(+), 9 deletions(-) diff --git a/database/cybersecurity/defensive_security.json b/database/cybersecurity/defensive_security.json index ec41e8b9f..90470773a 100644 --- a/database/cybersecurity/defensive_security.json +++ b/database/cybersecurity/defensive_security.json @@ -2,7 +2,7 @@ { "name": "Introduction to Defensive Security", "description": "Learn the fundamentals of defensive security, including strategies and practices to protect networks and systems.", - "url": "https://www.sans.org/cyber-security-skills-roadmap/defensive-security", + "url": "https://www.sans.org/cyber-security-skills-roadmap/", "category": "cyber-security", "subcategory": "defensive-security" }, diff --git a/database/cybersecurity/malware_analysis.json b/database/cybersecurity/malware_analysis.json index 6d7fc58c6..003a99b2c 100644 --- a/database/cybersecurity/malware_analysis.json +++ b/database/cybersecurity/malware_analysis.json @@ -14,16 +14,16 @@ "subcategory": "malware-analysis" }, { - "name": "Cuckoo Sandbox", - "description": "Learn about Cuckoo Sandbox, an open-source automated malware analysis system that can execute malicious files in a controlled environment.", - "url": "https://cuckoosandbox.org/", + "name": "Ghidra", + "description": "Ghidra is a free and open source reverse engineering tool for identifying and mapping out functions that may be of further interest to a malware analyst.", + "url": "https://ghidra-sre.org/", "category": "cyber-security", "subcategory": "malware-analysis" }, { "name": "Static and Dynamic Malware Analysis", "description": "Learn about static and dynamic malware analysis techniques used to dissect and understand the behavior of malicious software.", - "url": "https://www.fireeye.com/services/freeware/flare.html", + "url": "https://www.trellix.com/", "category": "cyber-security", "subcategory": "malware-analysis" }, diff --git a/database/cybersecurity/web_application_security.json b/database/cybersecurity/web_application_security.json index 40a1647e1..01c058446 100644 --- a/database/cybersecurity/web_application_security.json +++ b/database/cybersecurity/web_application_security.json @@ -9,7 +9,7 @@ { "name": "Certified Web Application Penetration Tester (CWAPT) Certification", "description": "Information on the CWAPT certification, a specialized certification for professionals focusing on web application penetration testing.", - "url": "https://www.mile2.com/web-application-penetration-tester-cwapt.html", + "url": "https://mile2.com/web-application-penetration-tester-cwapt.html", "category": "cyber-security", "subcategory": "web-security" }, @@ -23,7 +23,7 @@ { "name": "OWASP AppSec Conferences", "description": "Information about the OWASP AppSec conferences, which focus on web application security, including penetration testing techniques.", - "url": "https://owasp.org/www-project-appsec/", + "url": "https://owasp.org/", "category": "cyber-security", "subcategory": "web-security" }, diff --git a/database/frontend/ui-generators.json b/database/frontend/ui-generators.json index 7417926b4..df11ffa25 100644 --- a/database/frontend/ui-generators.json +++ b/database/frontend/ui-generators.json @@ -30,14 +30,14 @@ { "name": "Uiverse.io", "description": "It provides tons of cool UI elements made with HTML & CSS.", - "url": "https://uiverse.io/all", + "url": "https://uiverse.io/", "category": "frontend", "subcategory": "ui-generators" }, { "name": "CSS Portal", "description": "A bundle of amazing UI CSS elements for you to use in your project.", - "url": "https://www.cssportal.com/ui-generators.php", + "url": "https://www.cssportal.com/", "category": "frontend", "subcategory": "ui-generators" },