nao-sec / RigEKLinks
Analyzing Rig Exploit Kit
☆49Updated 8 years ago
Alternatives and similar repositories for RigEK
Users that are interested in RigEK are comparing it to the libraries listed below
Sorting:
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆109Updated 2 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Past presentation materials☆10Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- RAT / Botnet Simulator for pentest / education☆82Updated 6 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Malware.lu tools☆63Updated 12 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- Useful crypto tools for CTF☆40Updated 3 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Personal repository for all ctf related stuffs☆67Updated 11 months ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- ☆94Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- List of real-world threats against endpoint protection software☆215Updated 2 months ago
- linux rootkit☆162Updated 7 years ago
- ☆50Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago