Run-time trojan attack on neural networks
☆25Feb 8, 2019Updated 7 years ago
Alternatives and similar repositories for stux-DNN
Users that are interested in stux-DNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Reconnecting Websocket Client Golang Library☆11May 13, 2017Updated 8 years ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21Sep 24, 2017Updated 8 years ago
- A fault injection framework for spiking neural networks☆10Mar 20, 2026Updated last month
- [NeurIPS 2024] Advancing Training Efficiency of Deep Spiking Neural Networks through Rate-based Backpropagation☆19Jan 16, 2025Updated last year
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- ☆13Aug 31, 2024Updated last year
- ☆18Jul 30, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- ☆10Jan 22, 2020Updated 6 years ago
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- ☆14Oct 21, 2021Updated 4 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- xss payloads generator☆25Mar 1, 2019Updated 7 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Man in the middle for NLA enabled RDP in python☆16Nov 26, 2021Updated 4 years ago
- A golang client of our webshell scanner API☆28Mar 9, 2018Updated 8 years ago
- PyTorch implementation of Targeted Adversarial Perturbations for Monocular Depth Predictions (in NeurIPS 2020)☆16Nov 15, 2022Updated 3 years ago
- 一个HIDS agent端的demo☆17Feb 29, 2020Updated 6 years ago
- Webshell和钓鱼网站检测(阿里云安全算法挑战赛 第29名)☆60Feb 2, 2018Updated 8 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆34Jul 2, 2025Updated 10 months ago
- 机器学习、深度学习、数据挖掘算法小练习存档,包括Iris_classification、face_recognition_and_similar_face_found、handwriting_recognition、newsgroups_classification等。☆11Jun 25, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 6 years ago
- CVE-2023-21768 Windows 11 22H2 系统本地提权 POC☆23Mar 22, 2023Updated 3 years ago
- 《Python 核心编程 第二版》 (《Core Python Programming 2nd Edition》) 学习笔记、事例代码以及课后练习☆23Nov 10, 2015Updated 10 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- homemade-CTF-challenges☆23Oct 25, 2017Updated 8 years ago
- Domain Generation Algorithms research papers, datasets and code☆15May 17, 2020Updated 5 years ago