Analyzing Rig Exploit Kit
☆50May 17, 2017Updated 8 years ago
Alternatives and similar repositories for RigEK
Users that are interested in RigEK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- gdbserver implementation on BitVisor☆24Nov 8, 2017Updated 8 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 8 months ago
- ☆14Jan 12, 2018Updated 8 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- ☆28Jan 4, 2018Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- RIG Exploit Kit (front end)☆31Feb 25, 2015Updated 11 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- ☆16Oct 4, 2012Updated 13 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- exploit-database-papers☆14Nov 27, 2017Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Jul 24, 2017Updated 8 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- simple x86 emulator☆121Mar 28, 2021Updated 5 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Clean knowledge sharing jekyll theme☆52Jun 25, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- ☆13Mar 21, 2026Updated 3 weeks ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago