Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for backdoor attacks
backdoor-attacks
x
55 search results found
Pixload
⭐
1,163
Image Payload Creating/Injecting tools
Backdoor Learning Resources
⭐
888
A list of backdoor learning resources
0xsp Mongoose
⭐
530
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Backdoorbox
⭐
325
The open-sourced Python toolbox for backdoor attacks and defenses.
Trojanzoo
⭐
260
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Imgbackdoor
⭐
120
Hide your payload into .jpg file
Keres
⭐
82
Persistent Powershell backdoor tool
Openbackdoor
⭐
75
An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)
Awesome Backdoor In Deep Learning
⭐
73
A curated list of papers & resources on backdoor attacks and defenses in deep learning.
Backdoor
⭐
66
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
Ultimate Rat Collection
⭐
64
For educational purposes only, samples of old & new malware builders including screenshots!
Narcissus
⭐
61
The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack success rate.
Awesome Data Poisoning And Backdoor Attacks
⭐
55
A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them
Nad
⭐
52
This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks](https://openreview.net/pdf?id=9l0K4OM-oX in PyTorch.
Warping Based_backdoor_attack Release
⭐
42
WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)
I Bau
⭐
36
Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''
Rickrolling The Artist
⭐
35
Source code for our ICCV 2023 paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".
Federated Learning Backdoor
⭐
33
ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341
Anp_backdoor
⭐
31
Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"
Cognitivedistillation
⭐
27
[ICLR2023] Distilling Cognitive Backdoor Patterns within an Image
Input Aware Backdoor Attack Release
⭐
27
Input-aware Dynamic Backdoor Attack (NeurIPS 2020)
Server Scanner
⭐
26
Server Scanner detect rootkit and backdoor
Flip
⭐
24
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning [ICLR‘23, Best Paper Award at ECCV’22 AROW Workshop]
Decree
⭐
24
Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders
Msbackdoor
⭐
24
[Discontinued] Transform your payload into fake powerpoint (.ppt)
Dfst
⭐
23
This is the repository for DFST paper Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Rofl Project Code
⭐
22
Dllreverseshell
⭐
18
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Backdoor Lth
⭐
18
[CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu Chang, Sijia Liu, and Zhangyang Wang
Hiddenkiller
⭐
18
Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"
Frequency Backdoor
⭐
18
ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Repo. explores how we can use these artifacts to develop stronger backdoor defenses and attacks.
Fl Analysis
⭐
16
Rust Backdoors
⭐
15
More bind and reverse shells! This time written in Rust.
Neural Network Backdoors
⭐
11
Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.
Meta Sift
⭐
11
The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on poisoned dataset.
Video Backdoor Attack
⭐
10
Clean-Label Backdoor Attacks on Video Recognition Models, CVPR2020
Backdoor Fivemsql Discord
⭐
10
Linea para script que se introduce en cualquier server (servidor suyo o permitido [uso responsable]) en un script de un servidor FiveM, es un backdoor (puerta trasera) para "hackear" una base de datos de un servidor en red.
Imperio
⭐
9
Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.
Saturn Backdoor
⭐
8
A EASY TO USE `Ngrok` backdoor creator on a IP:PORT
Baadd
⭐
8
Code for Backdoor Attacks Against Dataset Distillation
Defending Against Backdoors With Robust Learning Rate
⭐
7
The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".
Argd
⭐
7
This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation](https://arxiv.org/abs/2204.09975) in PyTorch.
Backdoor Suite
⭐
7
A module-based repository for testing and evaluating backdoor attacks and defenses.
Fine Pruning Defense
⭐
7
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)
Rethinking Backdoor Attacks
⭐
7
Anydesk Backdoor
⭐
6
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increase the security of the open sourcecode.
Non Adversarial_backdoor
⭐
6
Implementation of "Beating Backdoor Attack at Its Own Game" (ICCV-23).
Awesome Data Poisoning
⭐
6
Waba
⭐
6
Backdoor Attacks for Remote Sensing Data with Wavelet Transform
Paper Reading Dl Security
⭐
5
简单记录一下读过的DL-Security相关比较有意思的paper,方便以后要用的时候找到
R4b
⭐
5
R4B, a backdoor based on reverse port opening so as to avoid firewall detection.
Target_identification
⭐
5
CCS'22 Paper: "Identifying a Training-Set Attack’s Target Using Renormalized Influence Estimation"
Mithridates
⭐
5
Measure and Boost Backdoor Robustness
Njrat Platinum Edition Rus
⭐
5
njRAT Platinum Edition Russified
1-55 of 55 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.