Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts