☆11Updated this week
Alternatives and similar repositories for mlsploit-execution-backend
Users that are interested in mlsploit-execution-backend are comparing it to the libraries listed below
Sorting:
- ☆11Apr 22, 2022Updated 3 years ago
- Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks☆23May 8, 2023Updated 2 years ago
- Automatic Training Data Generation with Affinity Coding☆26Aug 15, 2019Updated 6 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression☆82Mar 24, 2023Updated 2 years ago
- Framework for writing tests for RISC-V CPU/SOC validation.☆11Jan 19, 2026Updated last month
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- RISC-V Confidential VM Extension☆13Jan 14, 2026Updated last month
- Parallel k-core Decomposition on Multicore Platforms☆11Oct 12, 2020Updated 5 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Libgore☆13Apr 14, 2023Updated 2 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- ☆13Mar 27, 2020Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- ☆15Mar 7, 2018Updated 7 years ago
- A javascript example of drawing graphs with D3☆10Aug 28, 2019Updated 6 years ago
- The GA-IDS is a full-fledged host based intrusion detection system developed using the Java programming language to help detect packets h…☆12Feb 27, 2019Updated 7 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- SVG OpenType Workshop Web application☆26Nov 18, 2015Updated 10 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆14May 17, 2018Updated 7 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- ☆17Apr 18, 2025Updated 10 months ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago