Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆142Feb 28, 2024Updated 2 years ago
- ☆68Oct 6, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Phishing Framework for Pentesters☆202May 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated 2 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆209Apr 3, 2025Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆200Aug 29, 2024Updated last year
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361May 31, 2024Updated last year
- Zero Infrastructure Password Cracking☆417Aug 22, 2024Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated 2 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆844Feb 23, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- A library for parsing security advisories☆13Feb 5, 2026Updated 2 months ago
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 6 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- CveXplore☆42Mar 26, 2026Updated 3 weeks ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- A Python dependency resolver☆25Mar 2, 2026Updated last month
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- encoding format, library, and utilities for passive DNS data☆27Mar 29, 2024Updated 2 years ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,824Updated this week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- Scripts as a service. Builds on systemd (for Linux)☆21Mar 10, 2026Updated last month
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 2 weeks ago
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago