bryankim96 / stux-DNN
Run-time trojan attack on neural networks
☆25Updated 5 years ago
Related projects: ⓘ
- Private CTF scripts☆12Updated last month
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- Collection of AI and Security Papers☆26Updated 4 years ago
- ☆13Updated last year
- ☆25Updated this week
- A simple script for quickly mining sensitive information in binary files.☆29Updated 3 years ago
- Resources for CloudNative security research☆32Updated 3 years ago
- ☆12Updated 8 years ago
- ☆21Updated this week
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆40Updated 6 years ago
- Webshell Detection Based on Deep Learning☆10Updated 6 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 6 years ago
- ☆28Updated this week
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆15Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆26Updated 7 years ago
- ☆10Updated this week
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Updated 5 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 5 years ago
- Challenges I created for 35c3☆48Updated 5 years ago
- Penetration Test Framwork☆22Updated 6 years ago
- ☆12Updated this week
- Project code and dependent component analysis tools.☆2Updated 10 months ago
- ☆17Updated 6 years ago
- A Scrapy-based crawler for crawling Exploit Database☆13Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 5 years ago
- ☆26Updated this week
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 7 years ago
- ☆17Updated 5 years ago