For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Image Payload Creating/Injecting tools
#计算机科学#A list of backdoor learning resources
The open-sourced Python toolbox for backdoor attacks and defenses.
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and t...
Hide your payload into .jpg file
#计算机科学#Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
#计算机科学#TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
#计算机科学#Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
#Awesome#A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)
#计算机科学#A curated list of papers & resources on backdoor attacks and defenses in deep learning.
#自然语言处理#An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)
Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without running a...
#计算机科学#WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)
This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks](https://openreview.net/pdf?id=9l0K4OM-oXE) in PyTorch.
Persistent Powershell backdoor tool {😈}
The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack...
BackdoorSim: An Educational into Remote Administration Tools
You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best ways of penetration. This is done in order to test and increas...
ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341