Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆189Apr 17, 2024Updated 2 years ago
- Phishing Framework for Pentesters☆203May 16, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated 2 years ago
- Web server and API to scan any websites to detect malicious JS☆18Jul 26, 2022Updated 3 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆209Apr 3, 2025Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361May 31, 2024Updated last year
- Zero Infrastructure Password Cracking☆418Aug 22, 2024Updated last year
- ☆16Aug 19, 2024Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆845Feb 23, 2026Updated 2 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,219Feb 3, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 5 years ago
- CveXplore☆41Apr 20, 2026Updated 2 weeks ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆44Jul 23, 2024Updated last year
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,844Updated this week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Apr 30, 2026Updated last week
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago