akamai / luda

Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed …
74Updated last year

Alternatives and similar repositories for luda:

Users that are interested in luda are comparing it to the libraries listed below