Analyzing Rig Exploit Kit
☆49May 17, 2017Updated 8 years ago
Alternatives and similar repositories for RigEK
Users that are interested in RigEK are comparing it to the libraries listed below
Sorting:
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 5 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- ☆28Jan 4, 2018Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Extension for GDB☆106Apr 15, 2024Updated last year
- ☆15Oct 4, 2012Updated 13 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- ソーマ・カーネル・プロジェクト☆10Apr 12, 2017Updated 8 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- Nintendo switch debugger for radare2☆13Aug 12, 2018Updated 7 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Oct 16, 2017Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Vulnerable Web App☆13Nov 11, 2015Updated 10 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- Clean knowledge sharing jekyll theme☆52Jun 25, 2021Updated 4 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago