An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: backdoor-attacks

LingyuDu/SecureGaze

The formal implementation for SenSys2025 paper: SecureGaze: Defending Gaze Estimation Against Backdoor Attacks

Language: Jupyter Notebook - Size: 51.2 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 4 - Forks: 0

thunlp/OpenBackdoor

An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)

Language: Python - Size: 37.8 MB - Last synced at: 1 day ago - Pushed at: about 2 years ago - Stars: 181 - Forks: 27

mtuann/backdoor-ai-resources

Backdoor Stuff in AI/ ML domain

Size: 740 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 25 - Forks: 1

mtuann/research-papers

The resources are collected from various sources, including arXiv, NeurIPS, ICML, ICLR, ACL, EMNLP, AAAI, IJCAI, KDD, CVPR, ICCV, ECCV, NIPS, IEEE, ACM, Springer, ScienceDirect, Wiley, Nature, Science, and other top AI/ ML conferences and journals.

Size: 157 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 6 - Forks: 0

AiGptCode/ANYDESK-BACKDOOR

You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.

Language: Python - Size: 43 KB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 72 - Forks: 18

THUYimingLi/BackdoorBox

The open-sourced Python toolbox for backdoor attacks and defenses.

Language: Python - Size: 451 KB - Last synced at: 6 days ago - Pushed at: about 2 months ago - Stars: 542 - Forks: 82

Cryakl/Ultimate-RAT-Collection

For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.

Size: 12.6 GB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 2,550 - Forks: 451

DomaDude123/TinyC-Compiler-Backdoor

TinyCC Backdoor Quine: Self-Reproducing Compiler Attack

Language: C - Size: 0 Bytes - Last synced at: 10 days ago - Pushed at: 10 days ago - Stars: 0 - Forks: 0

Slaymish/malware-classifier-backdoors Fork of elastic/ember

Implementation of backdoor attacks and defenses in malware classification using machine learning models.

Language: Python - Size: 17.5 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 1 - Forks: 0

shahriar0651/NoiSec

Official Implementation of the NoiSec [ESORICS'25] paper: Let the Noise Speak โ€” A Unified Defense Against Adversarial and Backdoor Attacks

Language: Python - Size: 524 KB - Last synced at: 11 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

Malforge-Maldev-Public-Organization/Crafting-Trojan-Guide

This repository demonstrates how a Trojan can be crafted by backdooring an executable using code caves and shellcode injection. It is intended purely for educational purposes in cybersecurity and ethical hacking.

Language: Assembly - Size: 4.88 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

THUYimingLi/backdoor-learning-resources

A list of backdoor learning resources

Size: 1.07 MB - Last synced at: 6 days ago - Pushed at: 9 months ago - Stars: 1,104 - Forks: 176

jinhoishere/backdoor-attack-and-defense

Backdoor attack and the corresponding defense by activation clustering in Trustworthy Machine Learning

Language: Jupyter Notebook - Size: 1.71 MB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 0 - Forks: 0

ELMERIKH/Beryl

Payload Dropper with Persistance & Privesc & UAC bypass ๐Ÿฑโ€๐Ÿ‘ค

Language: Python - Size: 79.7 MB - Last synced at: 13 days ago - Pushed at: about 1 year ago - Stars: 13 - Forks: 1

HKU-TASR/Sanitizer

[EuroS&P 2025] Sanitizer is a server-side method that ensures client-embedded backdoors can only be used for contribution demonstration in federated learning but not be triggered on natural queries in harmful ways.

Language: Python - Size: 78 MB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 3 - Forks: 0

penghui-yang/awesome-data-poisoning-and-backdoor-attacks ๐Ÿ“ฆ

A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)

Size: 52.7 KB - Last synced at: 11 days ago - Pushed at: 4 months ago - Stars: 252 - Forks: 24

KaiyuanZh/OrthogLinearBackdoor

[IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks

Language: Python - Size: 50.8 MB - Last synced at: 26 days ago - Pushed at: 26 days ago - Stars: 21 - Forks: 2

xiaolin-cs/BackTime

BackTime: Backdoor Attacks on Multivariate Time Series Forecasting

Language: Python - Size: 72.1 MB - Last synced at: 27 days ago - Pushed at: 28 days ago - Stars: 18 - Forks: 1

zux0x3a/0xsp-Mongoose ๐Ÿ“ฆ

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

Language: Pascal - Size: 26.4 MB - Last synced at: 7 days ago - Pushed at: about 3 years ago - Stars: 537 - Forks: 122

SJTUHaiyangYu/BackdoorMBTI

BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can facilitate the analysis and development of backdoor defense methods within a multimodal context.

Language: Python - Size: 5.55 MB - Last synced at: 11 days ago - Pushed at: 5 months ago - Stars: 19 - Forks: 1

Tsuyoken/ImgBackdoor

Hide your payload into .jpg file

Language: Shell - Size: 4.56 MB - Last synced at: about 1 month ago - Pushed at: over 3 years ago - Stars: 391 - Forks: 70

sshh12/llm_backdoor

Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without running any actual code on the victim's machine or thwart LLM-based fraud/moderation systems.

Language: Python - Size: 184 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 152 - Forks: 19

HanxunH/Detect-CLIP-Backdoor-Samples

[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining

Language: Jupyter Notebook - Size: 33.5 MB - Last synced at: 30 days ago - Pushed at: 2 months ago - Stars: 7 - Forks: 2

warisgill/FedDefender

FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).

Language: Python - Size: 37.1 KB - Last synced at: about 1 month ago - Pushed at: 10 months ago - Stars: 13 - Forks: 3

Euronymou5/LoVeRst

LoVerst is a backdoor generator and backdoor generating tools.

Language: Python - Size: 45.9 KB - Last synced at: about 1 month ago - Pushed at: over 2 years ago - Stars: 57 - Forks: 11

mahshid1378/Bot-LLM

Breaking long thought processes of o1-like LLMs, such as DeepSeek-R1, QwQ

Language: Python - Size: 13.9 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

thunlp/HiddenKiller

Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"

Language: Python - Size: 20.5 MB - Last synced at: 16 days ago - Pushed at: over 2 years ago - Stars: 42 - Forks: 9

madanokr001/REDLINE

Language: Python - Size: 19.5 KB - Last synced at: about 1 month ago - Pushed at: 4 months ago - Stars: 7 - Forks: 0

yhDing/SPEAR

[WWW 25] SPEAR: A Structure-Preserving Manipulation Method for Graph Backdoor Attacks

Language: Python - Size: 10.9 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 3 - Forks: 1

bolunwang/backdoor

Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.

Language: Python - Size: 31.2 MB - Last synced at: about 2 months ago - Pushed at: about 5 years ago - Stars: 280 - Forks: 66

jeongjin0/invisible-backdoor-object-detection

[ICIP 2024] Official implementation of our paper "Mask-based Invisible Backdoor Attacks on Object Detection" by Jeongjin Shin

Language: Python - Size: 3.26 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 9 - Forks: 1

lfillaz/winupdatebackdoor

Python backdoor

Language: Python - Size: 1.57 MB - Last synced at: about 1 month ago - Pushed at: 2 months ago - Stars: 6 - Forks: 4

JoyRiderJie/backdoor-attack

Here is a curated list of papers and resources on backdoor attacks and defenses in deep learning.

Size: 8.79 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Daniel-xsy/BALD

[ICLR'25] Can We Trust Embodied Agents? Exploring Backdoor Attacks against Embodied LLM-Based Decision-Making Systems

Size: 1.03 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

zihao-ai/BoT

๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅBreaking long thought processes of o1-like LLMs, such as DeepSeek-R1, QwQ

Language: Python - Size: 13.9 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 19 - Forks: 0

VITA-Group/Random-Shuffling-BackdoorDetect

[NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zhang*, Tianlong Chen, Xiaohan Chen, Zhangyang Wang

Language: Python - Size: 4.01 MB - Last synced at: 22 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

1captainnemo1/DLLREVERSESHELL

A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.

Language: C - Size: 435 KB - Last synced at: 11 days ago - Pushed at: almost 6 years ago - Stars: 34 - Forks: 14

ch-shin/awesome-data-poisoning

Size: 34.2 KB - Last synced at: 23 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

rohban-lab/TRODO

Official PyTorch implementation of "Scanning Trojaned Models Using Out-of-Distribution Samples" (NeurIPS 2024)

Language: Jupyter Notebook - Size: 1.13 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 1

Psmths/openssh-backdoor

Experimental and sneaky backdoor patch for OpenSSH Portable.

Size: 13.7 KB - Last synced at: 2 months ago - Pushed at: over 3 years ago - Stars: 20 - Forks: 8

ain-soph/trojanzoo

TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.

Language: Python - Size: 15.7 MB - Last synced at: 3 months ago - Pushed at: 9 months ago - Stars: 288 - Forks: 63

CPScript/Ngrok-BackDoor

A EASY TO USE `Ngrok` backdoor creator on a IP:PORT

Language: Python - Size: 28.3 KB - Last synced at: 5 days ago - Pushed at: over 1 year ago - Stars: 9 - Forks: 2

ebagdasa/backdoors101

Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.

Language: Python - Size: 29.2 MB - Last synced at: 3 months ago - Pushed at: over 2 years ago - Stars: 349 - Forks: 81

Faizan-Khanx/PYTHA-SHELL

PYTHA-SHELL is an educational cybersecurity tool featuring an RCE mode. It offers practical examples and demonstrations to help students understand various attacks and vulnerabilities in a controlled environment. PYTHA-SHELL provides hands-on experience with real-world security risks making it a valuable resource for learning and teaching

Size: 49.8 KB - Last synced at: about 1 month ago - Pushed at: 8 months ago - Stars: 3 - Forks: 0

VITA-Group/Backdoor-LTH

[CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu Chang, Sijia Liu, and Zhangyang Wang

Language: Python - Size: 2.06 MB - Last synced at: 22 days ago - Pushed at: over 2 years ago - Stars: 26 - Forks: 3

Megum1/LOTUS

[CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

Language: Python - Size: 1.71 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Megum1/ODSCAN

[IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models

Language: Python - Size: 16.8 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Megum1/DFST

[AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification

Language: Python - Size: 83.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 28 - Forks: 2

aviyall/windows-backdoor

A Python Based Windows Backdoor for targets hosted on public network

Language: Python - Size: 24.4 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 5 - Forks: 0

HKU-TASR/AnywhereDoor

AnywhereDoor is a multi-target backdoor attack tailored for object detection. Once implanted, it enables adversaries to specify different attack types (object vanishing, fabrication, or misclassification) and configurations (untargeted or targeted with specific classes) to dynamically control detection behavior.

Language: Jupyter Notebook - Size: 33.7 MB - Last synced at: about 2 months ago - Pushed at: 2 months ago - Stars: 2 - Forks: 1

KaiyuanZh/FLIP

[ICLR 2023, Best Paper Award at ECCVโ€™22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning

Language: Python - Size: 13.2 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 45 - Forks: 2

xandery-geek/BackdoorAttacks

A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...

Language: Python - Size: 182 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 13 - Forks: 1

LukeDSchenk/rust-backdoors

More bind and reverse shells! This time written in Rust.

Language: Rust - Size: 8.79 KB - Last synced at: 16 days ago - Pushed at: over 2 years ago - Stars: 50 - Forks: 6

JJ-Vice/TryBeforeYouBias

All code related to the Try Before you Bias (TBYB) tool based on the paper: Quantifying Bias in Text-to-Image Generative Models. You can access a hosted TBYB web-service (and comprae evaluations to other users) via: https://huggingface.co/spaces/JVice/try-before-you-bias

Language: Python - Size: 6.75 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 2 - Forks: 0

HKU-TASR/Imperio

[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.

Language: Python - Size: 779 KB - Last synced at: 4 months ago - Pushed at: about 1 year ago - Stars: 42 - Forks: 4

ASRS-Lab/Awesome-DL-Security-and-Privacy-Papers

Awesome-DL-Security-and-Privacy-Papers

Language: SCSS - Size: 105 KB - Last synced at: 5 days ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

VinAIResearch/Warping-based_Backdoor_Attack-release

WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)

Language: Python - Size: 687 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 111 - Forks: 17

BililiCode/ARGD

This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation](https://arxiv.org/abs/2204.09975) in PyTorch.

Language: Python - Size: 16.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 18 - Forks: 1

attarmau/Deep-Learning-Backdoor-Attack

Using data poisoning via Gaussian blur triggers as backdoor attacks on the MNIST dataset.

Language: Jupyter Notebook - Size: 7.18 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 2 - Forks: 0

tinwaninja/Simple-Backdoor-Scanner-PHP

Simple Backdoor Scanner

Language: PHP - Size: 22.5 KB - Last synced at: about 1 month ago - Pushed at: almost 5 years ago - Stars: 25 - Forks: 10

sighook/pixload

Image Payload Creating/Injecting tools

Language: Perl - Size: 115 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 1,202 - Forks: 238

FrenchWhiteHat/Spyroid

Spyroid VIP (EAGLE SPY V4) CRACKED VIP + CODE SOURCE

Size: 3.91 KB - Last synced at: 6 months ago - Pushed at: 7 months ago - Stars: 2 - Forks: 0

AryCra07/BadNets

A simple implementation of Badnets.

Language: Python - Size: 15.6 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

wssun/TiSE-CodeLM-Security

This repository provide the studies on the security of language models for code (CodeLMs).

Language: Python - Size: 267 MB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 28 - Forks: 0

alekseevskaia/OrderBkd

Backdoor attack in NLP

Language: Python - Size: 436 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 2 - Forks: 1

dunnkers/neural-network-backdoors

Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.

Language: Jupyter Notebook - Size: 363 MB - Last synced at: 28 days ago - Pushed at: almost 3 years ago - Stars: 18 - Forks: 0

jhcknzzm/Federated-Learning-Backdoor

ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341

Language: Python - Size: 630 KB - Last synced at: 7 months ago - Pushed at: about 2 years ago - Stars: 62 - Forks: 7

thunlp/BkdAtk-LWS

Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"

Language: Python - Size: 344 MB - Last synced at: 16 days ago - Pushed at: almost 4 years ago - Stars: 16 - Forks: 6

Secure-AI-Systems-Group/Qu-ANTI-zation

[NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"

Language: Python - Size: 95.7 KB - Last synced at: 2 months ago - Pushed at: over 3 years ago - Stars: 13 - Forks: 3

asif-hanif/baple

[MICCAI 2024] Official code repository of paper titled "BAPLe: Backdoor Attacks on Medical Foundation Models using Prompt Learning" accepted in MICCAI 2024 conference.

Language: Python - Size: 33.1 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 49 - Forks: 0

JJ-Vice/BAGM

All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models.

Language: Jupyter Notebook - Size: 46.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 6 - Forks: 0

nazmul-karim170/FIP-Fisher-Backdoor-Removal

[CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"

Language: Python - Size: 1.19 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 1

nazmul-karim170/NFT-Augmented-Backdoor-Purification

[ECCV'24] Official Implementation of "Augmented Neural Fine-Tuning for Efficient Backdoor Purification"

Language: Python - Size: 1.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 4 - Forks: 1

VinAIResearch/COMBAT

COMBAT: Alternated Training for Effective Clean-Label Backdoor Attack (AAAI 2024)

Language: Python - Size: 17.3 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Ittiwat812/BackdoorAll-In-One

This project contains various scripts and tools for backdoor operations. It includes several Python scripts that perform different tasks related to backdoor functionality.

Language: Python - Size: 1.3 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

SadSadSatan/Sad-Satan-RAT

created by a dark web user operating under the pseudonym ZK

Size: 20.8 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 1 - Forks: 0

dmzhari/miniecchi

Ecchi Mini Shell

Language: PHP - Size: 81.1 KB - Last synced at: about 1 month ago - Pushed at: over 3 years ago - Stars: 2 - Forks: 2

dmzhari/ecchi-shell

EcchiExploit Shell v1.0

Language: PHP - Size: 231 KB - Last synced at: about 1 month ago - Pushed at: almost 4 years ago - Stars: 6 - Forks: 3

dmzhari/hidden-shell

Simple POST Request Shell Command Execution

Language: PHP - Size: 49.8 KB - Last synced at: about 1 month ago - Pushed at: almost 4 years ago - Stars: 1 - Forks: 6

Tsuyoken/MSBackdoor

[Discontinued] Transform your payload into fake powerpoint (.ppt)

Language: Shell - Size: 3.07 MB - Last synced at: about 1 month ago - Pushed at: over 4 years ago - Stars: 40 - Forks: 13

grasses/PoisonPrompt

Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo:http://124.220.228.133:11107

Language: Python - Size: 212 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 9 - Forks: 1

gurbaaz27/CS776A-Course-Project

Can Adversarial training defend against Poisoning attacks?

Language: Jupyter Notebook - Size: 44.7 MB - Last synced at: about 1 month ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 2

dx4simo/Redsimo-Framwork

This is the 1st version of Redsimo Framework for pentesters. Subdomains enumeration, advanced port scannig, bruteforcing, whois recons, backdoors.etc

Language: Python - Size: 35.6 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

FakeAXL00/NotHuman

.ini adalah serangan backdoor level 1,bukan suatu ancaman tapi bisa melumpuhkan system dalam hitungan detik

Language: Python - Size: 5.86 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

nguyenhongson1902/Venomancer

Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated Learning

Language: Python - Size: 17.2 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

ebagdasa/mithridates

Measure and Boost Backdoor Robustness

Language: Jupyter Notebook - Size: 1.14 MB - Last synced at: 3 months ago - Pushed at: 10 months ago - Stars: 8 - Forks: 3

QichenZheng/psba-website

Towards Physical World Backdoor Attacks against Skeleton Action Recognition

Language: JavaScript - Size: 7.01 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

Mizugue/Crow-CC

This backdoor has been developed with intended to enhance my cybersecurity programming skills. This project incorporates the most common features found in backdoors, consolidating all functionalities into one program.

Language: Python - Size: 41 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

pacifiquem/backdoor-game

connect-4 backdoor game

Language: CSS - Size: 413 KB - Last synced at: 28 days ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 1

illidanlab/ABD

[ICML2023] Revisiting Data-Free Knowledge Distillation with Poisoned Teachers

Language: Python - Size: 145 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 22 - Forks: 1

leo-aa88/keylogger

Keylogger malware for penetration testing in Windows platforms

Language: C - Size: 34.2 KB - Last synced at: 21 days ago - Pushed at: over 3 years ago - Stars: 2 - Forks: 0

reds-lab/Meta-Sift

The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on poisoned dataset.

Language: Python - Size: 3.62 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 15 - Forks: 4

reds-lab/ASSET

This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms." ASSET achieves state-of-the-art reliability in detecting poisoned samples in end-to-end supervised learning/ self-supervised learning/ transfer learning.

Language: Python - Size: 115 KB - Last synced at: 11 months ago - Pushed at: almost 2 years ago - Stars: 14 - Forks: 0

reds-lab/Narcissus

The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack success rate.

Language: Python - Size: 143 KB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 96 - Forks: 10

sonofescobar1337/server-scanner

Server Scanner detect rootkit and backdoor

Language: JavaScript - Size: 140 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 46 - Forks: 10

ndraeger/waba

Backdoor Attacks for Remote Sensing Data with Wavelet Transform

Language: Python - Size: 20.3 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 8 - Forks: 0

ELMERIKH/Keres

Persistent Powershell backdoor tool {๐Ÿ˜ˆ}

Language: Python - Size: 322 KB - Last synced at: 12 months ago - Pushed at: about 1 year ago - Stars: 99 - Forks: 11

rdWei/DiscDoor

๐Ÿ”“ An Easy-to-Use Discord-Based Backdoor Tool

Language: Nim - Size: 3.86 MB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

ZaydH/target_identification

CCS'22 Paper: "Identifying a Training-Set Attackโ€™s Target Using Renormalized Influence Estimation"

Language: Python - Size: 73.2 KB - Last synced at: 11 months ago - Pushed at: over 1 year ago - Stars: 7 - Forks: 0

ShihaoZhaoZSH/Video-Backdoor-Attack

[CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models

Language: Python - Size: 108 KB - Last synced at: 12 months ago - Pushed at: almost 5 years ago - Stars: 36 - Forks: 3