Bundle of security analysis scripts for keras tensorflow models
☆16Apr 15, 2024Updated last year
Alternatives and similar repositories for bhakti
Users that are interested in bhakti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jun 15, 2024Updated last year
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- AI fun☆27Feb 27, 2025Updated last year
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- Undocumented Change Detector #supplychain #security☆18Updated this week
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- HELO: Test Big Ideas in Small Spaces.☆18Mar 11, 2026Updated last week
- LLM | Security | Operations in one github repo with good links and pictures.☆96Mar 15, 2026Updated last week
- The user library, public☆11Jun 29, 2023Updated 2 years ago
- ☆17Jul 25, 2024Updated last year
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Jan 23, 2026Updated 2 months ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated last month
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- personal NixOS config☆15Mar 17, 2026Updated last week
- ☆11Oct 29, 2024Updated last year
- Action to detect if a secret is initially detected in a PR commit☆11Jun 19, 2023Updated 2 years ago
- Convert issue form responses to JSON☆22Updated this week
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated last month
- BSoD PoC for CVE-2016-0051 (MS-016)☆10Feb 22, 2016Updated 10 years ago
- ☆12Mar 25, 2024Updated last year
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated last month
- ☆30Jan 14, 2026Updated 2 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆97Jan 20, 2025Updated last year
- ☆10Oct 16, 2025Updated 5 months ago
- MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency☆20Dec 21, 2024Updated last year
- VeighNa框架的东财证券EMT极速柜台接口☆26Dec 13, 2022Updated 3 years ago
- A simple Go library for generating graphs using Graphviz (http://graphviz.org)☆10Feb 26, 2018Updated 8 years ago
- SecProbe:任务驱动式大模型安全能力评测系统☆15Nov 29, 2024Updated last year
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆40Apr 20, 2019Updated 6 years ago