Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)
-
Updated
Nov 3, 2018 - Python
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Code for the paper "Exposing Backdoors in Robust Machine Learning Models"
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
Simple Backdoor Scanner
[CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models
This is a python based malware deployment and staging system used for red teaming purpose. Similar to Cobal Strike and other tools and can be used with other tools.
[Discontinued] Transform your payload into fake powerpoint (.ppt)
A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.
Labs and project for NYU Tandon ML for CyberSecurity course.
Repository for My Backdoor
A commandline backdoor accessible from the windows lock screen.
A simple and extensible setup for Federated Learning and Backdoor attacks in PyTorch.
Segmentation Based Backdoor Attack Detection ICMLC2020
This is the Pytorch implementation of TrojanNet: Embedding Hidden Trojan Horse Models in Neural Networks.
Trojan Attack Against DeepFM in Federated Learning.
A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR10.
A smiple php example to test sql injection and code injection
Simple POST Request Shell Command Execution
Add a description, image, and links to the backdoor-attacks topic page so that developers can more easily learn about it.
To associate your repository with the backdoor-attacks topic, visit your repo's landing page and select "manage topics."