Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
☆75Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for luda
Users that are interested in luda are comparing it to the libraries listed below
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- ☆69Oct 6, 2021Updated 4 years ago
- Phishing Framework for Pentesters☆200May 16, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- Web server and API to scan any websites to detect malicious JS☆19Jul 26, 2022Updated 3 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- ☆21Dec 22, 2020Updated 5 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,217Feb 3, 2025Updated last year
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Jul 23, 2024Updated last year
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 6 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated last month
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Apache-Flink-Web-Dashboard-RCE☆16Nov 15, 2019Updated 6 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- File Capability Extractor☆14Jul 12, 2025Updated 7 months ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago