Threat Landscape Dashboard - Exploit Kits

Assessing today's threats and the relationships between them

Top 10 Exploit Kits


Hunter Exploit Kit

The exploit kit attempts to exploit victim's who visit malicious websites with various vulnerabilities found in Microsoft, Oracle, a ...


Neutrino Exploit Kit

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and ...


Empire Pack Exploit Kit

The exploit kit, also referred to RIG-E, surfaced in September 2016 and takes advantage of flaws in Microsoft and Adobe software.


Magnitude Exploit Kit

Also known as Popads, Magnitude is used in malvertising attacks to infect victims who visit compromised websites.


RIG Exploit Kit

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, ...


Sundown Exploit Kit

Also referred to as the "Beta Exploit Pack," Sundown is known to distribute remote access Trojans (RATs) via phishing emails t ...


Terror Exploit Kit

The exploit kit was discovered in late 2016 and its codebase is from the Sundown exploit kit. The main focus of the exploit kit is to tu ...


Nebula Exploit Kit

Nebula, a re-brand of the Sundown exploit kit, is available for rent by the day, week, or month on underground forums and offers support ...


Bizarro Sundown Exploit Kit

The exploit kit, also known as GreenFlash, was first spotted in October of 2016 and is a predecessor to the Sundown exploit kit.


Nuclear Exploit Kit

Nuclear is a popular kit using the malware-as-a-service business model. In 2016 researchers speculated that it makes around $100,000 per ...