Run-time trojan attack on neural networks
☆25Feb 8, 2019Updated 7 years ago
Alternatives and similar repositories for stux-DNN
Users that are interested in stux-DNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- This is the implementation of our paper 'Open-sourced Dataset Protection via Backdoor Watermarking', accepted by the NeurIPS Workshop on …☆23Oct 13, 2021Updated 4 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- ☆21Sep 24, 2017Updated 8 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Oct 25, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- ☆13Aug 31, 2024Updated last year
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆18Jul 30, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- ☆29Sep 14, 2018Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Malice PDF Plugin☆16Jan 7, 2019Updated 7 years ago
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- 一个专门用于开发安全工具的HTTP类库.☆22Dec 5, 2019Updated 6 years ago
- xss payloads generator☆25Mar 1, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Listen to a curated collection of essays via. text-to-speech☆10Apr 10, 2019Updated 6 years ago
- MATLAB code for semi-supervised learning based on positive-unlabeled learning☆11Mar 21, 2018Updated 8 years ago
- A golang client of our webshell scanner API☆28Mar 9, 2018Updated 8 years ago
- 一个HIDS agent端的demo☆17Feb 29, 2020Updated 6 years ago
- 漏洞利用工具☆12Jan 7, 2019Updated 7 years ago
- Webshell和钓鱼网站检测(阿里云安全算法挑战赛 第29名)☆60Feb 2, 2018Updated 8 years ago
- A continuous integration (CI) system for 📓 Jupyter notebooks, built using 🧠 Amazon SageMaker.☆11Aug 5, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- 基于 puppeteer-core + chromium 的 XSS 机器人☆26Jun 27, 2019Updated 6 years ago
- 机器学习、深度学习、数据挖掘算法小练习存档,包括Iris_classification、face_recognition_and_similar_face_found、handwriting_recognition、newsgroups_classification等。☆11Jun 25, 2019Updated 6 years ago
- This repository contains notebooks showing how to perform mixed precision training in tf.keras 2.0☆12Dec 15, 2019Updated 6 years ago
- ☆11Jul 12, 2022Updated 3 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- CVE-2023-21768 Windows 11 22H2 系统本地提权 POC☆23Mar 22, 2023Updated 3 years ago