The source code of QueryAttack.
☆27Feb 23, 2025Updated last year
Alternatives and similar repositories for QueryAttack
Users that are interested in QueryAttack are comparing it to the libraries listed below
Sorting:
- [ToN 2023 && IWQoS 2021] FlexNF: Flexible Network Function Orchestration for Scalable On-Path Service Chain Serving☆19Jun 8, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- [ICML 2025] Speak Easy: Eliciting Harmful Jailbreaks from LLMs with Simple Interactions☆14Sep 27, 2025Updated 5 months ago
- [ICLR 2026] Draw-In-Mind: Rebalancing Designer-Painter Roles in Unified Multimodal Models Benefits Image Editing☆25Jan 27, 2026Updated last month
- Exercises for the Dafny Tutorial☆14May 21, 2018Updated 7 years ago
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆14Nov 19, 2024Updated last year
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 5 months ago
- ☆12Nov 5, 2024Updated last year
- ☆12Jun 8, 2017Updated 8 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- Deep Neural Networks for audio classification☆11Apr 11, 2024Updated last year
- [COLING 2025] Official repo of paper: "Not Aligned" is Not "Malicious": Being Careful about Hallucinations of Large Language Models' Jail…☆12Jul 26, 2024Updated last year
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆15Oct 10, 2023Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ☆11Feb 21, 2022Updated 4 years ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- Some materials about postgraduate recommendation, especially summer workshop.☆12Apr 7, 2020Updated 5 years ago
- Code for the paper "Jailbreak Large Vision-Language Models Through Multi-Modal Linkage"☆27Dec 6, 2024Updated last year
- Collection of my network covert channel tools.☆17Feb 25, 2026Updated last week
- A dataset repository of "Accurate Action Recommendation for Smart Home via Two-Level Encoders and Commonsense Knowledge" (CIKM 2022)☆16Aug 20, 2025Updated 6 months ago
- ☆17Dec 25, 2023Updated 2 years ago
- Anomaly detection using RAG☆17Apr 22, 2024Updated last year
- Automated Safety Testing of Large Language Models☆18Jan 31, 2025Updated last year
- 基于Wi-Fi CSI和机器学习的环境异常感知☆18Apr 8, 2020Updated 5 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Dec 14, 2025Updated 2 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- FANcY: FAst In-Network GraY Failure Detection for ISPs☆21Aug 19, 2022Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- BB-Gen: Packet Crafter☆16Aug 2, 2022Updated 3 years ago
- ☆19Mar 29, 2022Updated 3 years ago
- 中文恶意网页检测数据集与检测方法☆21Mar 4, 2025Updated last year
- A Semantic LOG ExtRaction Templating (SLOGERT) Approach☆20Nov 27, 2024Updated last year
- ☆21Jul 25, 2025Updated 7 months ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago