akamai / ludaLinks
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Updated last year
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below
Sorting:
- nse script to inject jndi payloads☆46Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- ☆69Updated 3 years ago
- ☆43Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆42Updated 3 months ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated 2 weeks ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆42Updated last year
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 3 years ago
- Active C2 IoCs☆99Updated 2 years ago
- ☆45Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆141Updated 2 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- ☆29Updated 5 months ago