diff --git a/clusters/exploit-kit.json b/clusters/exploit-kit.json index 30d73ed..6b09251 100644 --- a/clusters/exploit-kit.json +++ b/clusters/exploit-kit.json @@ -125,7 +125,7 @@ }, "uuid": "489acbf2-d80b-4bb5-ac7d-c8573dcb6324" }, - { + { "value": "ThreadKit", "description": "ThreadKit is the name given to a widely used Microsoft Office document exploit builder kit that appeared in June 2017", "meta": { @@ -134,9 +134,9 @@ ], "status": "Active" }, - "uuid": "b8be783c-69a8-11e8-adc0-fa7ae01bbebc" + "uuid": "b8be783c-69a8-11e8-adc0-fa7ae01bbebc" }, - { + { "value": "VenomKit", "description": "VenomKit is the name given to a kit sold since april 2017 as \"Word 1day exploit builder\" by user badbullzvenom. Author allows only use in targeted campaign. Is used for instance by the \"Cobalt Gang\"", "meta": { @@ -145,7 +145,7 @@ ], "status": "Active" }, - "uuid": "b8be7af8-69a8-11e8-adc0-fa7ae01bbebc" + "uuid": "b8be7af8-69a8-11e8-adc0-fa7ae01bbebc" }, { "value": "RIG", @@ -372,10 +372,10 @@ "refs": [ "https://nakedsecurity.sophos.com/2013/06/24/taking-a-closer-look-at-the-glazunov-exploit-kit/" ], - "status": "Retired - Last seen: maybe end of 2013" - }, + "status": "Retired - Last seen: maybe end of 2013" + }, "uuid": "897374fa-6a35-11e8-adc0-fa7ae01bbebc" - }, + }, { "value": "GrandSoft", "description": "GrandSoft Exploit Kit was a quite common exploit kit used in 2012/2013. Disappeared between march 2014 and September 2017",