akamai / luda
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆74Updated last year
Alternatives and similar repositories for luda:
Users that are interested in luda are comparing it to the libraries listed below
- ☆41Updated 2 years ago
- ☆68Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- nse script to inject jndi payloads☆45Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated last year
- ☆42Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Nessus Audit files☆30Updated last year
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆67Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Static Token And Credential Scanner☆95Updated last year
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- ☆41Updated 9 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Active C2 IoCs☆97Updated 2 years ago
- Kerberoast Detection Script☆30Updated 2 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Citrix Scanner for CVE-2023-3519☆49Updated last year
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- ☆44Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆99Updated 6 years ago
- A CALDERA plugin☆65Updated 11 months ago
- ☆27Updated last week