bryankim96 / stux-DNNLinks
Run-time trojan attack on neural networks
☆26Updated 6 years ago
Alternatives and similar repositories for stux-DNN
Users that are interested in stux-DNN are comparing it to the libraries listed below
Sorting:
- https://www.cdxy.me/?p=806☆32Updated 6 years ago
- My AI security testing projects☆41Updated 6 years ago
- Collection of AI and Security Papers☆27Updated 5 years ago
- ml webshellgg project☆38Updated 6 years ago
- 第二届阿里云安全算法挑战赛☆16Updated 7 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Updated 7 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- ☆12Updated 9 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- Resources for CloudNative security research☆32Updated 4 years ago
- Private CTF scripts☆12Updated last year
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- ☆79Updated 3 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- ☆18Updated 8 years ago
- ☆24Updated 5 years ago
- security machine learning☆72Updated 8 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Updated 7 years ago
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Updated 7 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 8 years ago
- 精心制作的恶意软件分析工具和资源列表A curated list of awesome malware analysis tools and resources☆42Updated 7 years ago
- Recurrent neural networks in predicting security exploits☆21Updated 9 years ago
- Snort rules☆35Updated 6 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Updated 3 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago
- Automatic extract anomalious Web attack Payloads with Unsupervised Machine Learning algorithms☆36Updated 7 years ago
- ☆16Updated 7 years ago
- awesome security paper☆155Updated 10 years ago