Image Payload Creating/Injecting tools
翻译 - 图像有效载荷创建/注入工具
#计算机科学#A list of backdoor learning resources
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and t...
翻译 - 特权升级枚举工具包(64/32),具有Web API集成的快速,智能枚举。掌握自己的发现
The open-sourced Python toolbox for backdoor attacks and defenses.
Hide your payload into .jpg file
#计算机科学#Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
#计算机科学#TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
#计算机科学#Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
#Awesome#A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)
#计算机科学#A curated list of papers & resources on backdoor attacks and defenses in deep learning.
#自然语言处理#An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)
Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without running a...
This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks](https://openreview.net/pdf?id=9l0K4OM-oXE) in PyTorch.
#计算机科学#WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)
Persistent Powershell backdoor tool {😈}
The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack...
BackdoorSim: An Educational into Remote Administration Tools
ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...