HKU-TASR / Imperio
[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.
☆40Updated 5 months ago
Related projects: ⓘ
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆72Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 2 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 10 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆20Updated 3 weeks ago
- ☆28Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 7 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- ☆27Updated this week
- ☆33Updated 6 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 6 months ago
- ☆35Updated 9 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆12Updated last month
- ☆19Updated this week
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆17Updated last month
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Updated 5 months ago
- ☆11Updated last month
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆31Updated 7 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆28Updated 8 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- Tool for scanning domains for .git directories.☆13Updated 11 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- ☆14Updated this week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆13Updated 4 months ago
- aiohttp LFI (CVE-2024-23334)☆22Updated 6 months ago
- ☆50Updated 5 months ago