From 7b5c5fd07fc4ff832f3e104f0bc6689073295ba5 Mon Sep 17 00:00:00 2001 From: Mathieu D Date: Thu, 21 Apr 2016 11:43:51 +0200 Subject: fix links in the readme --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index 0cb901a..73ffb8d 100644 --- a/README.md +++ b/README.md @@ -47,7 +47,7 @@ both) category, and should re-read the previous sentence. ## How does it work? Detection is performed by crawling the filesystem and testing files against a -[set]( https://github.com/nbs-system/php-malware-finder/blob/master/php.yar ) +[set](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/php.yar) of [YARA](https://plusvic.github.io/yara/) rules. Yes, it's that simple! @@ -79,13 +79,13 @@ Ho, and by the way, you can run the comprehensive testsuite with `make test`. ## Whitelisting -Check the [whitelist.yar]( https://github.com/nbs-system/php-malware-finder/blob/master/whitelist.yar ) file. +Check the [whitelist.yar](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/whitelist.yar) file. If you're lazy, you can generate whitelists for entire folders with the -[generate_whitelist.py]( https://github.com/nbs-system/php-malware-finder/blob/master/generate_whitelist.py ) script. +[generate_whitelist.py](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/generate_whitelist.py) script. ## Licensing -PHP-malware-finder is [licensed]( https://github.com/nbs-system/php-malware-finder/blob/master/LICENSE ) under the GNU General Public License v3. +PHP-malware-finder is [licensed](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/LICENSE) under the GNU General Public License v3. The _amazing_ YARA project is licensed under the Apache v2.0 license. -- cgit v1.3