akamai / ludaLinks
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Updated last year
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below
Sorting:
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- ☆44Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Active C2 IoCs☆99Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Typodetect☆74Updated 4 years ago
- ☆44Updated 3 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 3 weeks ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 3 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- A scanner for taking basic fingerprints☆53Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago