Topic: "backdoor-attacks"
Cryakl/Ultimate-RAT-Collection
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Size: 12.6 GB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 2,550 - Forks: 451

sighook/pixload
Image Payload Creating/Injecting tools
Language: Perl - Size: 115 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 1,202 - Forks: 238

THUYimingLi/backdoor-learning-resources
A list of backdoor learning resources
Size: 1.07 MB - Last synced at: 9 days ago - Pushed at: 9 months ago - Stars: 1,103 - Forks: 176

THUYimingLi/BackdoorBox
The open-sourced Python toolbox for backdoor attacks and defenses.
Language: Python - Size: 451 KB - Last synced at: 9 days ago - Pushed at: about 2 months ago - Stars: 539 - Forks: 82

zux0x3a/0xsp-Mongoose 📦
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Language: Pascal - Size: 26.4 MB - Last synced at: 10 days ago - Pushed at: about 3 years ago - Stars: 537 - Forks: 122

Tsuyoken/ImgBackdoor
Hide your payload into .jpg file
Language: Shell - Size: 4.56 MB - Last synced at: 27 days ago - Pushed at: over 3 years ago - Stars: 391 - Forks: 70

ebagdasa/backdoors101
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Language: Python - Size: 29.2 MB - Last synced at: 3 months ago - Pushed at: about 2 years ago - Stars: 349 - Forks: 81

ain-soph/trojanzoo
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Language: Python - Size: 15.7 MB - Last synced at: 2 months ago - Pushed at: 9 months ago - Stars: 288 - Forks: 63

bolunwang/backdoor
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
Language: Python - Size: 31.2 MB - Last synced at: about 1 month ago - Pushed at: about 5 years ago - Stars: 280 - Forks: 66

penghui-yang/awesome-data-poisoning-and-backdoor-attacks 📦
A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)
Size: 52.7 KB - Last synced at: 4 days ago - Pushed at: 4 months ago - Stars: 252 - Forks: 24

Sty1x/Fud-Crypter-2024-Styx-Builder
Legal and Effective: Styx FUD Crypter for Software Protection
Language: C# - Size: 36.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 217 - Forks: 0

thunlp/OpenBackdoor
An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)
Language: Python - Size: 37.8 MB - Last synced at: 9 days ago - Pushed at: about 2 years ago - Stars: 179 - Forks: 27

sshh12/llm_backdoor
Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without running any actual code on the victim's machine or thwart LLM-based fraud/moderation systems.
Language: Python - Size: 184 KB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 152 - Forks: 19

VinAIResearch/Warping-based_Backdoor_Attack-release
WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)
Language: Python - Size: 687 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 111 - Forks: 17

bboylyg/NAD
This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks](https://openreview.net/pdf?id=9l0K4OM-oXE) in PyTorch.
Language: Python - Size: 3.77 MB - Last synced at: over 1 year ago - Pushed at: over 3 years ago - Stars: 103 - Forks: 14

ELMERIKH/Keres
Persistent Powershell backdoor tool {😈}
Language: Python - Size: 322 KB - Last synced at: 11 months ago - Pushed at: 12 months ago - Stars: 99 - Forks: 11

reds-lab/Narcissus
The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack success rate.
Language: Python - Size: 143 KB - Last synced at: 11 months ago - Pushed at: almost 2 years ago - Stars: 96 - Forks: 10

zihao-ai/Awesome-Backdoor-in-Deep-Learning
A curated list of papers & resources on backdoor attacks and defenses in deep learning.
Language: Python - Size: 1.95 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 73 - Forks: 7

AiGptCode/ANYDESK-BACKDOOR
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
Language: Python - Size: 43 KB - Last synced at: about 8 hours ago - Pushed at: about 9 hours ago - Stars: 72 - Forks: 18

jhcknzzm/Federated-Learning-Backdoor
ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341
Language: Python - Size: 630 KB - Last synced at: 7 months ago - Pushed at: about 2 years ago - Stars: 62 - Forks: 7

Euronymou5/LoVeRst
LoVerst is a backdoor generator and backdoor generating tools.
Language: Python - Size: 45.9 KB - Last synced at: about 1 month ago - Pushed at: over 2 years ago - Stars: 57 - Forks: 11

LukeDSchenk/rust-backdoors
More bind and reverse shells! This time written in Rust.
Language: Rust - Size: 8.79 KB - Last synced at: 8 days ago - Pushed at: over 2 years ago - Stars: 50 - Forks: 6

asif-hanif/baple
[MICCAI 2024] Official code repository of paper titled "BAPLe: Backdoor Attacks on Medical Foundation Models using Prompt Learning" accepted in MICCAI 2024 conference.
Language: Python - Size: 33.1 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 49 - Forks: 0

csdongxian/ANP_backdoor
Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"
Language: Python - Size: 282 KB - Last synced at: about 1 year ago - Pushed at: almost 2 years ago - Stars: 48 - Forks: 12

sonofescobar1337/server-scanner
Server Scanner detect rootkit and backdoor
Language: JavaScript - Size: 140 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 46 - Forks: 10

KaiyuanZh/FLIP
[ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Language: Python - Size: 13.2 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 45 - Forks: 2

HKU-TASR/Imperio
[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.
Language: Python - Size: 779 KB - Last synced at: 4 months ago - Pushed at: about 1 year ago - Stars: 42 - Forks: 4

thunlp/HiddenKiller
Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"
Language: Python - Size: 20.5 MB - Last synced at: 9 days ago - Pushed at: over 2 years ago - Stars: 42 - Forks: 9

Tsuyoken/MSBackdoor
[Discontinued] Transform your payload into fake powerpoint (.ppt)
Language: Shell - Size: 3.07 MB - Last synced at: 24 days ago - Pushed at: over 4 years ago - Stars: 40 - Forks: 13

LukasStruppek/Rickrolling-the-Artist
Source code for our ICCV 2023 paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".
Language: Python - Size: 3.35 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 36 - Forks: 6

ShihaoZhaoZSH/Video-Backdoor-Attack
[CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models
Language: Python - Size: 108 KB - Last synced at: 12 months ago - Pushed at: almost 5 years ago - Stars: 36 - Forks: 3

1captainnemo1/DLLREVERSESHELL
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Language: C - Size: 435 KB - Last synced at: 4 days ago - Pushed at: almost 6 years ago - Stars: 34 - Forks: 14

YiZeng623/I-BAU
Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''
Language: Jupyter Notebook - Size: 11.9 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 31 - Forks: 11

YiZeng623/frequency-backdoor
ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Repo. explores how we can use these artifacts to develop stronger backdoor defenses and attacks.
Language: Jupyter Notebook - Size: 12 MB - Last synced at: almost 2 years ago - Pushed at: about 3 years ago - Stars: 31 - Forks: 4

Megum1/DFST
[AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Language: Python - Size: 83.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 28 - Forks: 2

wssun/TiSE-CodeLM-Security
This repository provide the studies on the security of language models for code (CodeLMs).
Language: Python - Size: 267 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 28 - Forks: 0

HanxunH/CognitiveDistillation
[ICLR2023] Distilling Cognitive Backdoor Patterns within an Image
Language: Python - Size: 1.58 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 27 - Forks: 2

VITA-Group/Backdoor-LTH
[CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu Chang, Sijia Liu, and Zhangyang Wang
Language: Python - Size: 2.06 MB - Last synced at: 14 days ago - Pushed at: over 2 years ago - Stars: 26 - Forks: 3

tinwaninja/Simple-Backdoor-Scanner-PHP
Simple Backdoor Scanner
Language: PHP - Size: 22.5 KB - Last synced at: 24 days ago - Pushed at: almost 5 years ago - Stars: 25 - Forks: 10

mtuann/backdoor-ai-resources
Backdoor Stuff in AI/ ML domain
Size: 738 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 24 - Forks: 1

GiantSeaweed/DECREE
Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders
Language: Python - Size: 3.34 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 24 - Forks: 1

pps-lab/rofl-project-code
Language: Rust - Size: 102 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 24 - Forks: 3

illidanlab/ABD
[ICML2023] Revisiting Data-Free Knowledge Distillation with Poisoned Teachers
Language: Python - Size: 145 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 22 - Forks: 1

KaiyuanZh/OrthogLinearBackdoor
[IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks
Language: Python - Size: 50.8 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 21 - Forks: 2

VITA-Group/Random-Shuffling-BackdoorDetect
[NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zhang*, Tianlong Chen, Xiaohan Chen, Zhangyang Wang
Language: Python - Size: 4.01 MB - Last synced at: 14 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

ch-shin/awesome-data-poisoning
Size: 34.2 KB - Last synced at: 15 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

Psmths/openssh-backdoor
Experimental and sneaky backdoor patch for OpenSSH Portable.
Size: 13.7 KB - Last synced at: about 2 months ago - Pushed at: over 3 years ago - Stars: 20 - Forks: 8

zihao-ai/BoT
🔥🔥🔥Breaking long thought processes of o1-like LLMs, such as DeepSeek-R1, QwQ
Language: Python - Size: 13.9 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 19 - Forks: 0

SJTUHaiyangYu/BackdoorMBTI
BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can facilitate the analysis and development of backdoor defense methods within a multimodal context.
Language: Python - Size: 5.55 MB - Last synced at: 4 days ago - Pushed at: 5 months ago - Stars: 19 - Forks: 1

pps-lab/fl-analysis
Language: Python - Size: 12.1 MB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 19 - Forks: 0

xiaolin-cs/BackTime
BackTime: Backdoor Attacks on Multivariate Time Series Forecasting
Language: Python - Size: 72.1 MB - Last synced at: 20 days ago - Pushed at: 20 days ago - Stars: 18 - Forks: 1

BililiCode/ARGD
This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation](https://arxiv.org/abs/2204.09975) in PyTorch.
Language: Python - Size: 16.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 18 - Forks: 1

dunnkers/neural-network-backdoors
Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.
Language: Jupyter Notebook - Size: 363 MB - Last synced at: 21 days ago - Pushed at: almost 3 years ago - Stars: 18 - Forks: 0

SewoongLab/spectre-defense
Defending Against Backdoor Attacks Using Robust Covariance Estimation
Language: Python - Size: 42 KB - Last synced at: over 1 year ago - Pushed at: almost 4 years ago - Stars: 16 - Forks: 5

thunlp/BkdAtk-LWS
Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"
Language: Python - Size: 344 MB - Last synced at: 9 days ago - Pushed at: almost 4 years ago - Stars: 16 - Forks: 6

MadryLab/rethinking-backdoor-attacks
Language: Python - Size: 5.86 KB - Last synced at: 12 months ago - Pushed at: almost 2 years ago - Stars: 15 - Forks: 0

reds-lab/Meta-Sift
The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on poisoned dataset.
Language: Python - Size: 3.62 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 15 - Forks: 4

TinfoilHat0/Defending-Against-Backdoors-with-Robust-Learning-Rate
The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".
Language: Python - Size: 25.2 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 15 - Forks: 12

Megum1/BEAGLE
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Language: Python - Size: 169 MB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 14 - Forks: 2

reds-lab/ASSET
This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms." ASSET achieves state-of-the-art reliability in detecting poisoned samples in end-to-end supervised learning/ self-supervised learning/ transfer learning.
Language: Python - Size: 115 KB - Last synced at: 11 months ago - Pushed at: almost 2 years ago - Stars: 14 - Forks: 0

Huiying-Li/Latent-Backdoor
This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Backdoor Attacks on Deep Neural Networks, CCS'19.
Language: Python - Size: 13.7 KB - Last synced at: almost 2 years ago - Pushed at: over 3 years ago - Stars: 14 - Forks: 2

MurageKabui/Windows-Backdoor
A commandline backdoor accessible from the windows login and lock screen to manipulate files and directories.
Language: Batchfile - Size: 36.1 KB - Last synced at: almost 2 years ago - Pushed at: about 4 years ago - Stars: 14 - Forks: 2

RAF-87/win-back-cat
A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
Language: Batchfile - Size: 94.7 KB - Last synced at: almost 2 years ago - Pushed at: over 4 years ago - Stars: 14 - Forks: 11

xandery-geek/BackdoorAttacks
A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...
Language: Python - Size: 182 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 13 - Forks: 1

warisgill/FedDefender
FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).
Language: Python - Size: 37.1 KB - Last synced at: about 1 month ago - Pushed at: 10 months ago - Stars: 13 - Forks: 3

ELMERIKH/Beryl
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
Language: Python - Size: 79.7 MB - Last synced at: 6 days ago - Pushed at: about 1 year ago - Stars: 13 - Forks: 1

Secure-AI-Systems-Group/Qu-ANTI-zation
[NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"
Language: Python - Size: 95.7 KB - Last synced at: about 2 months ago - Pushed at: over 3 years ago - Stars: 13 - Forks: 3

amicheh/asm_reverse_shell
the assembly shell and backdoor Trojan
Language: Assembly - Size: 20.5 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 12 - Forks: 3

Megum1/LOTUS
[CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Language: Python - Size: 1.71 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Megum1/ODSCAN
[IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models
Language: Python - Size: 16.8 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Sonklol/backdoor-fivemsql-discord
Linea para script que se introduce en cualquier server (servidor suyo o permitido [uso responsable]) en un script de un servidor FiveM, es un backdoor (puerta trasera) para "hackear" una base de datos de un servidor en red.
Language: Lua - Size: 10.7 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 10 - Forks: 4

jeongjin0/invisible-backdoor-object-detection
[ICIP 2024] Official implementation of our paper "Mask-based Invisible Backdoor Attacks on Object Detection" by Jeongjin Shin
Language: Python - Size: 3.26 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 9 - Forks: 1

grasses/PoisonPrompt
Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo:http://124.220.228.133:11107
Language: Python - Size: 212 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 9 - Forks: 1

CPScript/Ngrok-BackDoor
A EASY TO USE `Ngrok` backdoor creator on a IP:PORT
Language: Python - Size: 28.3 KB - Last synced at: 9 days ago - Pushed at: over 1 year ago - Stars: 9 - Forks: 2

ebagdasa/mithridates
Measure and Boost Backdoor Robustness
Language: Jupyter Notebook - Size: 1.14 MB - Last synced at: 3 months ago - Pushed at: 10 months ago - Stars: 8 - Forks: 3

minliu01/non-adversarial_backdoor
Implementation of "Beating Backdoor Attack at Its Own Game" (ICCV-23).
Language: Python - Size: 624 KB - Last synced at: 30 days ago - Pushed at: over 1 year ago - Stars: 8 - Forks: 0

ndraeger/waba
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Language: Python - Size: 20.3 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 8 - Forks: 0

HanxunH/Detect-CLIP-Backdoor-Samples
[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining
Language: Jupyter Notebook - Size: 33.5 MB - Last synced at: 23 days ago - Pushed at: 2 months ago - Stars: 7 - Forks: 2

madanokr001/REDLINE
Language: Python - Size: 19.5 KB - Last synced at: 23 days ago - Pushed at: 4 months ago - Stars: 7 - Forks: 0

ZaydH/target_identification
CCS'22 Paper: "Identifying a Training-Set Attack’s Target Using Renormalized Influence Estimation"
Language: Python - Size: 73.2 KB - Last synced at: 11 months ago - Pushed at: over 1 year ago - Stars: 7 - Forks: 0

JumpeerYT/njRAT-Platinum-Edition-RuS
njRAT Platinum Edition Russified
Size: 13.5 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 7 - Forks: 0

SewoongLab/backdoor-suite
A module-based repository for testing and evaluating backdoor attacks and defenses.
Language: Python - Size: 173 KB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 7 - Forks: 1

vtu81/backdoor_attack
Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.
Language: Jupyter Notebook - Size: 189 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 7 - Forks: 1

Billy1900/BadNet
A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR10.
Language: Python - Size: 2.48 MB - Last synced at: about 2 years ago - Pushed at: almost 4 years ago - Stars: 7 - Forks: 1

mtuann/research-papers
The resources are collected from various sources, including arXiv, NeurIPS, ICML, ICLR, ACL, EMNLP, AAAI, IJCAI, KDD, CVPR, ICCV, ECCV, NIPS, IEEE, ACM, Springer, ScienceDirect, Wiley, Nature, Science, and other top AI/ ML conferences and journals.
Size: 157 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 6 - Forks: 0

lfillaz/winupdatebackdoor
Python backdoor
Language: Python - Size: 1.57 MB - Last synced at: 28 days ago - Pushed at: 2 months ago - Stars: 6 - Forks: 4

JJ-Vice/BAGM
All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models.
Language: Jupyter Notebook - Size: 46.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 6 - Forks: 0

piyushsharma220699/Backdoor-in-Cyber-Security
Project SAANP : Implementation of Backdoor using Python
Language: Python - Size: 23.5 MB - Last synced at: about 1 year ago - Pushed at: over 3 years ago - Stars: 6 - Forks: 0

dmzhari/ecchi-shell
EcchiExploit Shell v1.0
Language: PHP - Size: 231 KB - Last synced at: 28 days ago - Pushed at: almost 4 years ago - Stars: 6 - Forks: 3

Billy1900/TrojanNet
This is the Pytorch implementation of TrojanNet: Embedding Hidden Trojan Horse Models in Neural Networks.
Language: Python - Size: 12.7 KB - Last synced at: about 2 years ago - Pushed at: almost 4 years ago - Stars: 6 - Forks: 1

aviyall/windows-backdoor
A Python Based Windows Backdoor for targets hosted on public network
Language: Python - Size: 24.4 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 5 - Forks: 0

lafeat/flareon
Flareon: Stealthy Backdoor Injection via Poisoned Augmentation
Language: Python - Size: 846 KB - Last synced at: over 1 year ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0

GorkaAbad/NeuromorphicBackdoors
[CCS'22] Backdoor Attacks on Spiking NNs and Neuromorphic Datasets
Language: Python - Size: 310 KB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 5 - Forks: 0

lancopku/DAN
[Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks
Language: Python - Size: 17.6 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 5 - Forks: 0

liuyugeng/baadd
Code for Backdoor Attacks Against Dataset Distillation
Size: 1.95 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 5 - Forks: 0

darksidergod/R4B
R4B, a backdoor based on reverse port opening so as to avoid firewall detection.
Language: Python - Size: 1.02 MB - Last synced at: almost 2 years ago - Pushed at: over 2 years ago - Stars: 5 - Forks: 1

caohch-1/Paper-Reading-DL-Security
简单记录一下读过的DL-Security相关比较有意思的paper,方便以后要用的时候找到
Size: 5.86 KB - Last synced at: almost 2 years ago - Pushed at: over 3 years ago - Stars: 5 - Forks: 0

aldiskatel/Backdoor 📦
Repository for My Backdoor
Language: PHP - Size: 381 KB - Last synced at: about 1 year ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 0

nazmul-karim170/NFT-Augmented-Backdoor-Purification
[ECCV'24] Official Implementation of "Augmented Neural Fine-Tuning for Efficient Backdoor Purification"
Language: Python - Size: 1.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 4 - Forks: 1

gurbaaz27/CS776A-Course-Project
Can Adversarial training defend against Poisoning attacks?
Language: Jupyter Notebook - Size: 44.7 MB - Last synced at: 23 days ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 2
