akamai / luda
View external linksLinks

Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
75Oct 30, 2023Updated 2 years ago

Alternatives and similar repositories for luda

Users that are interested in luda are comparing it to the libraries listed below

Sorting:

Are these results useful?