An open API service providing repository metadata for many open source software ecosystems.

Topic: "backdoor-attacks"

Cryakl/Ultimate-RAT-Collection

For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.

Size: 12.6 GB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 2,550 - Forks: 451

sighook/pixload

Image Payload Creating/Injecting tools

Language: Perl - Size: 115 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 1,202 - Forks: 238

THUYimingLi/backdoor-learning-resources

A list of backdoor learning resources

Size: 1.07 MB - Last synced at: 9 days ago - Pushed at: 9 months ago - Stars: 1,103 - Forks: 176

THUYimingLi/BackdoorBox

The open-sourced Python toolbox for backdoor attacks and defenses.

Language: Python - Size: 451 KB - Last synced at: 9 days ago - Pushed at: about 2 months ago - Stars: 539 - Forks: 82

zux0x3a/0xsp-Mongoose 📦

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

Language: Pascal - Size: 26.4 MB - Last synced at: 10 days ago - Pushed at: about 3 years ago - Stars: 537 - Forks: 122

Tsuyoken/ImgBackdoor

Hide your payload into .jpg file

Language: Shell - Size: 4.56 MB - Last synced at: 27 days ago - Pushed at: over 3 years ago - Stars: 391 - Forks: 70

ebagdasa/backdoors101

Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.

Language: Python - Size: 29.2 MB - Last synced at: 3 months ago - Pushed at: about 2 years ago - Stars: 349 - Forks: 81

ain-soph/trojanzoo

TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.

Language: Python - Size: 15.7 MB - Last synced at: 2 months ago - Pushed at: 9 months ago - Stars: 288 - Forks: 63

bolunwang/backdoor

Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.

Language: Python - Size: 31.2 MB - Last synced at: about 1 month ago - Pushed at: about 5 years ago - Stars: 280 - Forks: 66

penghui-yang/awesome-data-poisoning-and-backdoor-attacks 📦

A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)

Size: 52.7 KB - Last synced at: 4 days ago - Pushed at: 4 months ago - Stars: 252 - Forks: 24

Sty1x/Fud-Crypter-2024-Styx-Builder

Legal and Effective: Styx FUD Crypter for Software Protection

Language: C# - Size: 36.1 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 217 - Forks: 0

thunlp/OpenBackdoor

An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)

Language: Python - Size: 37.8 MB - Last synced at: 9 days ago - Pushed at: about 2 years ago - Stars: 179 - Forks: 27

sshh12/llm_backdoor

Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without running any actual code on the victim's machine or thwart LLM-based fraud/moderation systems.

Language: Python - Size: 184 KB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 152 - Forks: 19

VinAIResearch/Warping-based_Backdoor_Attack-release

WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)

Language: Python - Size: 687 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 111 - Forks: 17

bboylyg/NAD

This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks](https://openreview.net/pdf?id=9l0K4OM-oXE) in PyTorch.

Language: Python - Size: 3.77 MB - Last synced at: over 1 year ago - Pushed at: over 3 years ago - Stars: 103 - Forks: 14

ELMERIKH/Keres

Persistent Powershell backdoor tool {😈}

Language: Python - Size: 322 KB - Last synced at: 11 months ago - Pushed at: 12 months ago - Stars: 99 - Forks: 11

reds-lab/Narcissus

The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack success rate.

Language: Python - Size: 143 KB - Last synced at: 11 months ago - Pushed at: almost 2 years ago - Stars: 96 - Forks: 10

zihao-ai/Awesome-Backdoor-in-Deep-Learning

A curated list of papers & resources on backdoor attacks and defenses in deep learning.

Language: Python - Size: 1.95 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 73 - Forks: 7

AiGptCode/ANYDESK-BACKDOOR

You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.

Language: Python - Size: 43 KB - Last synced at: about 8 hours ago - Pushed at: about 9 hours ago - Stars: 72 - Forks: 18

jhcknzzm/Federated-Learning-Backdoor

ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341

Language: Python - Size: 630 KB - Last synced at: 7 months ago - Pushed at: about 2 years ago - Stars: 62 - Forks: 7

Euronymou5/LoVeRst

LoVerst is a backdoor generator and backdoor generating tools.

Language: Python - Size: 45.9 KB - Last synced at: about 1 month ago - Pushed at: over 2 years ago - Stars: 57 - Forks: 11

LukeDSchenk/rust-backdoors

More bind and reverse shells! This time written in Rust.

Language: Rust - Size: 8.79 KB - Last synced at: 8 days ago - Pushed at: over 2 years ago - Stars: 50 - Forks: 6

asif-hanif/baple

[MICCAI 2024] Official code repository of paper titled "BAPLe: Backdoor Attacks on Medical Foundation Models using Prompt Learning" accepted in MICCAI 2024 conference.

Language: Python - Size: 33.1 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 49 - Forks: 0

csdongxian/ANP_backdoor

Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"

Language: Python - Size: 282 KB - Last synced at: about 1 year ago - Pushed at: almost 2 years ago - Stars: 48 - Forks: 12

sonofescobar1337/server-scanner

Server Scanner detect rootkit and backdoor

Language: JavaScript - Size: 140 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 46 - Forks: 10

KaiyuanZh/FLIP

[ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning

Language: Python - Size: 13.2 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 45 - Forks: 2

HKU-TASR/Imperio

[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.

Language: Python - Size: 779 KB - Last synced at: 4 months ago - Pushed at: about 1 year ago - Stars: 42 - Forks: 4

thunlp/HiddenKiller

Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"

Language: Python - Size: 20.5 MB - Last synced at: 9 days ago - Pushed at: over 2 years ago - Stars: 42 - Forks: 9

Tsuyoken/MSBackdoor

[Discontinued] Transform your payload into fake powerpoint (.ppt)

Language: Shell - Size: 3.07 MB - Last synced at: 24 days ago - Pushed at: over 4 years ago - Stars: 40 - Forks: 13

LukasStruppek/Rickrolling-the-Artist

Source code for our ICCV 2023 paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".

Language: Python - Size: 3.35 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 36 - Forks: 6

ShihaoZhaoZSH/Video-Backdoor-Attack

[CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models

Language: Python - Size: 108 KB - Last synced at: 12 months ago - Pushed at: almost 5 years ago - Stars: 36 - Forks: 3

1captainnemo1/DLLREVERSESHELL

A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.

Language: C - Size: 435 KB - Last synced at: 4 days ago - Pushed at: almost 6 years ago - Stars: 34 - Forks: 14

YiZeng623/I-BAU

Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''

Language: Jupyter Notebook - Size: 11.9 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 31 - Forks: 11

YiZeng623/frequency-backdoor

ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Repo. explores how we can use these artifacts to develop stronger backdoor defenses and attacks.

Language: Jupyter Notebook - Size: 12 MB - Last synced at: almost 2 years ago - Pushed at: about 3 years ago - Stars: 31 - Forks: 4

Megum1/DFST

[AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification

Language: Python - Size: 83.4 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 28 - Forks: 2

wssun/TiSE-CodeLM-Security

This repository provide the studies on the security of language models for code (CodeLMs).

Language: Python - Size: 267 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 28 - Forks: 0

HanxunH/CognitiveDistillation

[ICLR2023] Distilling Cognitive Backdoor Patterns within an Image

Language: Python - Size: 1.58 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 27 - Forks: 2

VITA-Group/Backdoor-LTH

[CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu Chang, Sijia Liu, and Zhangyang Wang

Language: Python - Size: 2.06 MB - Last synced at: 14 days ago - Pushed at: over 2 years ago - Stars: 26 - Forks: 3

tinwaninja/Simple-Backdoor-Scanner-PHP

Simple Backdoor Scanner

Language: PHP - Size: 22.5 KB - Last synced at: 24 days ago - Pushed at: almost 5 years ago - Stars: 25 - Forks: 10

mtuann/backdoor-ai-resources

Backdoor Stuff in AI/ ML domain

Size: 738 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 24 - Forks: 1

GiantSeaweed/DECREE

Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders

Language: Python - Size: 3.34 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 24 - Forks: 1

pps-lab/rofl-project-code

Language: Rust - Size: 102 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 24 - Forks: 3

illidanlab/ABD

[ICML2023] Revisiting Data-Free Knowledge Distillation with Poisoned Teachers

Language: Python - Size: 145 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 22 - Forks: 1

KaiyuanZh/OrthogLinearBackdoor

[IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks

Language: Python - Size: 50.8 MB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 21 - Forks: 2

VITA-Group/Random-Shuffling-BackdoorDetect

[NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zhang*, Tianlong Chen, Xiaohan Chen, Zhangyang Wang

Language: Python - Size: 4.01 MB - Last synced at: 14 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

ch-shin/awesome-data-poisoning

Size: 34.2 KB - Last synced at: 15 days ago - Pushed at: over 2 years ago - Stars: 20 - Forks: 0

Psmths/openssh-backdoor

Experimental and sneaky backdoor patch for OpenSSH Portable.

Size: 13.7 KB - Last synced at: about 2 months ago - Pushed at: over 3 years ago - Stars: 20 - Forks: 8

zihao-ai/BoT

🔥🔥🔥Breaking long thought processes of o1-like LLMs, such as DeepSeek-R1, QwQ

Language: Python - Size: 13.9 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 19 - Forks: 0

SJTUHaiyangYu/BackdoorMBTI

BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can facilitate the analysis and development of backdoor defense methods within a multimodal context.

Language: Python - Size: 5.55 MB - Last synced at: 4 days ago - Pushed at: 5 months ago - Stars: 19 - Forks: 1

pps-lab/fl-analysis

Language: Python - Size: 12.1 MB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 19 - Forks: 0

xiaolin-cs/BackTime

BackTime: Backdoor Attacks on Multivariate Time Series Forecasting

Language: Python - Size: 72.1 MB - Last synced at: 20 days ago - Pushed at: 20 days ago - Stars: 18 - Forks: 1

BililiCode/ARGD

This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation](https://arxiv.org/abs/2204.09975) in PyTorch.

Language: Python - Size: 16.9 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 18 - Forks: 1

dunnkers/neural-network-backdoors

Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.

Language: Jupyter Notebook - Size: 363 MB - Last synced at: 21 days ago - Pushed at: almost 3 years ago - Stars: 18 - Forks: 0

SewoongLab/spectre-defense

Defending Against Backdoor Attacks Using Robust Covariance Estimation

Language: Python - Size: 42 KB - Last synced at: over 1 year ago - Pushed at: almost 4 years ago - Stars: 16 - Forks: 5

thunlp/BkdAtk-LWS

Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"

Language: Python - Size: 344 MB - Last synced at: 9 days ago - Pushed at: almost 4 years ago - Stars: 16 - Forks: 6

MadryLab/rethinking-backdoor-attacks

Language: Python - Size: 5.86 KB - Last synced at: 12 months ago - Pushed at: almost 2 years ago - Stars: 15 - Forks: 0

reds-lab/Meta-Sift

The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on poisoned dataset.

Language: Python - Size: 3.62 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 15 - Forks: 4

TinfoilHat0/Defending-Against-Backdoors-with-Robust-Learning-Rate

The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".

Language: Python - Size: 25.2 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 15 - Forks: 12

Megum1/BEAGLE

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense

Language: Python - Size: 169 MB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 14 - Forks: 2

reds-lab/ASSET

This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms." ASSET achieves state-of-the-art reliability in detecting poisoned samples in end-to-end supervised learning/ self-supervised learning/ transfer learning.

Language: Python - Size: 115 KB - Last synced at: 11 months ago - Pushed at: almost 2 years ago - Stars: 14 - Forks: 0

Huiying-Li/Latent-Backdoor

This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Backdoor Attacks on Deep Neural Networks, CCS'19.

Language: Python - Size: 13.7 KB - Last synced at: almost 2 years ago - Pushed at: over 3 years ago - Stars: 14 - Forks: 2

MurageKabui/Windows-Backdoor

A commandline backdoor accessible from the windows login and lock screen to manipulate files and directories.

Language: Batchfile - Size: 36.1 KB - Last synced at: almost 2 years ago - Pushed at: about 4 years ago - Stars: 14 - Forks: 2

RAF-87/win-back-cat

A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.

Language: Batchfile - Size: 94.7 KB - Last synced at: almost 2 years ago - Pushed at: over 4 years ago - Stars: 14 - Forks: 11

xandery-geek/BackdoorAttacks

A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...

Language: Python - Size: 182 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 13 - Forks: 1

warisgill/FedDefender

FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).

Language: Python - Size: 37.1 KB - Last synced at: about 1 month ago - Pushed at: 10 months ago - Stars: 13 - Forks: 3

ELMERIKH/Beryl

Payload Dropper with Persistance & Privesc & UAC bypass 🐱‍👤

Language: Python - Size: 79.7 MB - Last synced at: 6 days ago - Pushed at: about 1 year ago - Stars: 13 - Forks: 1

Secure-AI-Systems-Group/Qu-ANTI-zation

[NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"

Language: Python - Size: 95.7 KB - Last synced at: about 2 months ago - Pushed at: over 3 years ago - Stars: 13 - Forks: 3

amicheh/asm_reverse_shell

the assembly shell and backdoor Trojan

Language: Assembly - Size: 20.5 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 12 - Forks: 3

Megum1/LOTUS

[CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

Language: Python - Size: 1.71 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Megum1/ODSCAN

[IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models

Language: Python - Size: 16.8 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 11 - Forks: 0

Sonklol/backdoor-fivemsql-discord

Linea para script que se introduce en cualquier server (servidor suyo o permitido [uso responsable]) en un script de un servidor FiveM, es un backdoor (puerta trasera) para "hackear" una base de datos de un servidor en red.

Language: Lua - Size: 10.7 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 10 - Forks: 4

jeongjin0/invisible-backdoor-object-detection

[ICIP 2024] Official implementation of our paper "Mask-based Invisible Backdoor Attacks on Object Detection" by Jeongjin Shin

Language: Python - Size: 3.26 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 9 - Forks: 1

grasses/PoisonPrompt

Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo:http://124.220.228.133:11107

Language: Python - Size: 212 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 9 - Forks: 1

CPScript/Ngrok-BackDoor

A EASY TO USE `Ngrok` backdoor creator on a IP:PORT

Language: Python - Size: 28.3 KB - Last synced at: 9 days ago - Pushed at: over 1 year ago - Stars: 9 - Forks: 2

ebagdasa/mithridates

Measure and Boost Backdoor Robustness

Language: Jupyter Notebook - Size: 1.14 MB - Last synced at: 3 months ago - Pushed at: 10 months ago - Stars: 8 - Forks: 3

minliu01/non-adversarial_backdoor

Implementation of "Beating Backdoor Attack at Its Own Game" (ICCV-23).

Language: Python - Size: 624 KB - Last synced at: 30 days ago - Pushed at: over 1 year ago - Stars: 8 - Forks: 0

ndraeger/waba

Backdoor Attacks for Remote Sensing Data with Wavelet Transform

Language: Python - Size: 20.3 MB - Last synced at: 11 months ago - Pushed at: about 2 years ago - Stars: 8 - Forks: 0

HanxunH/Detect-CLIP-Backdoor-Samples

[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining

Language: Jupyter Notebook - Size: 33.5 MB - Last synced at: 23 days ago - Pushed at: 2 months ago - Stars: 7 - Forks: 2

madanokr001/REDLINE

Language: Python - Size: 19.5 KB - Last synced at: 23 days ago - Pushed at: 4 months ago - Stars: 7 - Forks: 0

ZaydH/target_identification

CCS'22 Paper: "Identifying a Training-Set Attack’s Target Using Renormalized Influence Estimation"

Language: Python - Size: 73.2 KB - Last synced at: 11 months ago - Pushed at: over 1 year ago - Stars: 7 - Forks: 0

JumpeerYT/njRAT-Platinum-Edition-RuS

njRAT Platinum Edition Russified

Size: 13.5 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 7 - Forks: 0

SewoongLab/backdoor-suite

A module-based repository for testing and evaluating backdoor attacks and defenses.

Language: Python - Size: 173 KB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 7 - Forks: 1

vtu81/backdoor_attack

Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.

Language: Jupyter Notebook - Size: 189 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 7 - Forks: 1

Billy1900/BadNet

A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR10.

Language: Python - Size: 2.48 MB - Last synced at: about 2 years ago - Pushed at: almost 4 years ago - Stars: 7 - Forks: 1

mtuann/research-papers

The resources are collected from various sources, including arXiv, NeurIPS, ICML, ICLR, ACL, EMNLP, AAAI, IJCAI, KDD, CVPR, ICCV, ECCV, NIPS, IEEE, ACM, Springer, ScienceDirect, Wiley, Nature, Science, and other top AI/ ML conferences and journals.

Size: 157 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 6 - Forks: 0

lfillaz/winupdatebackdoor

Python backdoor

Language: Python - Size: 1.57 MB - Last synced at: 28 days ago - Pushed at: 2 months ago - Stars: 6 - Forks: 4

JJ-Vice/BAGM

All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models.

Language: Jupyter Notebook - Size: 46.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 6 - Forks: 0

piyushsharma220699/Backdoor-in-Cyber-Security

Project SAANP : Implementation of Backdoor using Python

Language: Python - Size: 23.5 MB - Last synced at: about 1 year ago - Pushed at: over 3 years ago - Stars: 6 - Forks: 0

dmzhari/ecchi-shell

EcchiExploit Shell v1.0

Language: PHP - Size: 231 KB - Last synced at: 28 days ago - Pushed at: almost 4 years ago - Stars: 6 - Forks: 3

Billy1900/TrojanNet

This is the Pytorch implementation of TrojanNet: Embedding Hidden Trojan Horse Models in Neural Networks.

Language: Python - Size: 12.7 KB - Last synced at: about 2 years ago - Pushed at: almost 4 years ago - Stars: 6 - Forks: 1

aviyall/windows-backdoor

A Python Based Windows Backdoor for targets hosted on public network

Language: Python - Size: 24.4 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 5 - Forks: 0

lafeat/flareon

Flareon: Stealthy Backdoor Injection via Poisoned Augmentation

Language: Python - Size: 846 KB - Last synced at: over 1 year ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0

GorkaAbad/NeuromorphicBackdoors

[CCS'22] Backdoor Attacks on Spiking NNs and Neuromorphic Datasets

Language: Python - Size: 310 KB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 5 - Forks: 0

lancopku/DAN

[Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks

Language: Python - Size: 17.6 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 5 - Forks: 0

liuyugeng/baadd

Code for Backdoor Attacks Against Dataset Distillation

Size: 1.95 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 5 - Forks: 0

darksidergod/R4B

R4B, a backdoor based on reverse port opening so as to avoid firewall detection.

Language: Python - Size: 1.02 MB - Last synced at: almost 2 years ago - Pushed at: over 2 years ago - Stars: 5 - Forks: 1

caohch-1/Paper-Reading-DL-Security

简单记录一下读过的DL-Security相关比较有意思的paper,方便以后要用的时候找到

Size: 5.86 KB - Last synced at: almost 2 years ago - Pushed at: over 3 years ago - Stars: 5 - Forks: 0

aldiskatel/Backdoor 📦

Repository for My Backdoor

Language: PHP - Size: 381 KB - Last synced at: about 1 year ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 0

nazmul-karim170/NFT-Augmented-Backdoor-Purification

[ECCV'24] Official Implementation of "Augmented Neural Fine-Tuning for Efficient Backdoor Purification"

Language: Python - Size: 1.3 MB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 4 - Forks: 1

gurbaaz27/CS776A-Course-Project

Can Adversarial training defend against Poisoning attacks?

Language: Jupyter Notebook - Size: 44.7 MB - Last synced at: 23 days ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 2

Related Topics
backdoor 49 deep-learning 33 machine-learning 26 python 21 backdoor-defense 21 backdoors 20 pytorch 18 adversarial-attacks 15 security 15 federated-learning 14 trojan 13 hacking 11 malware 10 windows 9 cybersecurity 9 adversarial-machine-learning 8 pentesting 8 hacking-tool 8 backdoorpython 7 ai-security 7 deep-neural-networks 7 reverse-shell 7 rat 7 backdoor-detection 7 data-poisoning 7 computer-vision 6 njrat 5 data-poisoning-attacks 5 php 5 poisoning-attack 5 backdoor-defenses 5 keylogger 5 trustworthy-ai 5 python3 5 nlp 5 fud 5 exploit 4 payload 4 ransomware 4 cyber-security 4 remote-control 4 shell 4 object-detection 4 webshell 4 fud-backdoor 3 fud-rat 3 hacktoberfest 3 backdoors-created 3 backdoor-attack 3 netcat 3 payloads 3 deep-learning-security 3 payload-generator 3 ai-safety 3 reverse-engineering 3 robustness 3 security-tools 3 penetration-testing 3 malware-analysis 3 crypter 3 backdoor-learning 3 trojan-rat 3 tcp 3 trojan-malware 3 poisoning-attacks 3 pentest-tool 3 pentesting-tools 3 kali-linux 2 artificial-intelligence 2 powershell 2 rust 2 trustworthy-machine-learning 2 pytorch-implementation 2 metasploit 2 ml-security 2 poisoning-defenses 2 multithreading 2 keylogger-python 2 bypass-antivirus 2 crypter-defender 2 crypter-fud 2 prompt-engineering 2 qwq 2 awesome-list 2 deepseek-r1 2 chain-of-thought 2 web 2 hacking-tools 2 neurips-2021 2 python-backdoor 2 java 2 ai 2 transfer-learning 2 shell-script 2 machine-learning-security 2 llm 2 malware-samples 2 malware-sample 2 payload-injector 2 backdoorweb 2