nao-sec / RigEKView external linksLinks
Analyzing Rig Exploit Kit
☆49May 17, 2017Updated 8 years ago
Alternatives and similar repositories for RigEK
Users that are interested in RigEK are comparing it to the libraries listed below
Sorting:
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 5 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- The C3, SMT/SAT solver written in C.☆35Aug 10, 2025Updated 6 months ago
- https://github.com/sk2sat/emu のほうで一から作り直ししてます☆24Jul 8, 2017Updated 8 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- ☆28Jan 4, 2018Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 10 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Extension for GDB☆106Apr 15, 2024Updated last year
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- ソーマ・カーネル・プロジェクト☆10Apr 12, 2017Updated 8 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 2 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Oct 16, 2017Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Dec 14, 2016Updated 9 years ago
- Vulnerable Web App☆13Nov 11, 2015Updated 10 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- Clean knowledge sharing jekyll theme☆52Jun 25, 2021Updated 4 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago