☆13May 17, 2025Updated 9 months ago
Alternatives and similar repositories for Corba
Users that are interested in Corba are comparing it to the libraries listed below
Sorting:
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Sep 1, 2025Updated 6 months ago
- ☆27Jun 28, 2025Updated 8 months ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆21Aug 9, 2025Updated 6 months ago
- [ICML2025] Official code for "Reinforced Lifelong Editing for Language Models"☆21Feb 23, 2025Updated last year
- ☆47Feb 25, 2026Updated last week
- ☆33Sep 13, 2024Updated last year
- ☆37Nov 16, 2025Updated 3 months ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- [ICML 2025] RocketKV: Accelerating Long-Context LLM Inference via Two-Stage KV Cache Compression☆34Aug 7, 2025Updated 6 months ago
- ☆37Sep 30, 2024Updated last year
- ☆12Dec 22, 2025Updated 2 months ago
- BiasFinder | IEEE TSE | Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems☆11Jan 18, 2022Updated 4 years ago
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Dec 20, 2022Updated 3 years ago
- Open Hackathon Playbook☆20Feb 19, 2026Updated 2 weeks ago
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- ☆11Nov 30, 2025Updated 3 months ago
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆12Jun 5, 2025Updated 9 months ago
- This is the code repository for "Uncovering Safety Risks of Large Language Models through Concept Activation Vector"☆47Oct 13, 2025Updated 4 months ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆36Oct 6, 2025Updated 5 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 7 months ago
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated 2 months ago
- 设置指定应用抓包 Xposed 插件☆14May 20, 2022Updated 3 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- ☆10Dec 18, 2024Updated last year
- ☆10Sep 25, 2024Updated last year
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆27Dec 25, 2025Updated 2 months ago
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated last year
- ☆11Mar 5, 2023Updated 3 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Magisk Plugin for Updating iptables When Proxy Changes☆11Mar 17, 2025Updated 11 months ago
- Code and data release of the paper Enhancing LLM Complex Problem-Solving with Hybrid Thinking and Dynamic Workflows☆14Oct 4, 2024Updated last year
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- LLM-based mutation testing☆14Feb 3, 2025Updated last year