☆30May 22, 2025Updated 10 months ago
Alternatives and similar repositories for Backdoor-Data-Extraction
Users that are interested in Backdoor-Data-Extraction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICLR 2026] BARREL: Boundary-Aware Reasoning for Factual and Reliable LRMs☆18May 21, 2025Updated 10 months ago
- ☆23Jul 20, 2025Updated 8 months ago
- Official Repository for Task-Circuit Quantization☆24Jun 1, 2025Updated 10 months ago
- [ACL 2025] LongSafety: Evaluating Long-Context Safety of Large Language Models☆16Jun 18, 2025Updated 9 months ago
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization☆29Jul 9, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AISafetyLab: A comprehensive framework covering safety attack, defense, evaluation and paper list.☆237Aug 29, 2025Updated 7 months ago
- 2022春季学期清华大学计算机图形学大作业☆12Mar 4, 2023Updated 3 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- ☆16Nov 18, 2024Updated last year
- Openreviewers: Multi Agent Academic Review Simulation System☆23Mar 2, 2024Updated 2 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Agent Security Bench (ASB)☆214Oct 27, 2025Updated 5 months ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- ☆20Oct 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ferret: Faster and Effective Automated Red Teaming with Reward-Based Scoring Technique☆19Aug 22, 2024Updated last year
- ☆57Mar 11, 2025Updated last year
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Automatic Prompt Injection testing tool☆25Mar 8, 2025Updated last year
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆49Jan 26, 2026Updated 2 months ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Enhancing Retrieval and Managing Retrieval: 4-Module Synergy☆23Dec 7, 2024Updated last year
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 months ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- An implementation of MSSRM method☆11Mar 23, 2023Updated 3 years ago
- ☆319Jan 29, 2026Updated 2 months ago
- A ground-up rebuild of the stock gridfinity bins in OpenSCAD☆14Aug 29, 2022Updated 3 years ago
- DETR tensor去除推理过程无用辅助头+fp16部署再次加速+解决转tensorrt 输出全为0问题的新方法。☆11Jan 9, 2024Updated 2 years ago
- Exploring advanced prompting tools to query SQL database with multiple tables in natural language using LLMs☆16Aug 23, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- My Ubuntu Ansible Playbooks Playground☆15Apr 6, 2026Updated last week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- Code for Rethinking Prompt Optimizers: From Prompt Merits to Optimization☆13Jan 12, 2026Updated 3 months ago
- A template project to deploy airflow with argo CD☆12Jun 23, 2022Updated 3 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 6 months ago
- official implementation of Training-free Boost for Open-Vocabulary Object Detection with Confidence Aggregation☆13Apr 15, 2024Updated last year