Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated last year
- Web server and API to scan any websites to detect malicious JS☆19Jul 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 11 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆360May 31, 2024Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Apr 20, 2021Updated 4 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- ☆16Aug 19, 2024Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last month
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- File Capability Extractor☆14Jul 12, 2025Updated 8 months ago
- A library for parsing security advisories☆13Feb 5, 2026Updated last month
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 5 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- encoding format, library, and utilities for passive DNS data☆27Mar 29, 2024Updated last year
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Jan 29, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Where a Linux sys-admin's perinoid scripts are collected.☆10Feb 3, 2016Updated 10 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- server2012-Group-policy-RCE☆46Oct 29, 2019Updated 6 years ago