Adversarial Robustness, White-box, Adversarial Attack

“Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack”Ye Liu, Yaya Cheng, Lianli Gao, Xianglong Liu, Qilong Zhang, Jingkuan SongCVPR 2022 Code, model weights, and datasets have been released. We will continue to optimize the code.paper will be released soon. A practical evaluation method should be convenient (i.e., parameter-free), efficient (i.e., fewer iterations) and reliable (i.e., approaching the lower bound of robustness). Towards this target, we propose a parameter-free Adaptive Auto Attack (A3) evaluation method. We apply A3 to over […]

Read more

Implementation of an attack on a tropical algebra discrete logarithm based protocol

This code implements the attack detailed in the paper: On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product Any Muanalifah, Sergei Sergeev Which can be found at:https://eprint.iacr.org/2021/040.pdf The script “iacr2021040.py” taken an optional argument specifying the dimension of the public matrix to generate. If not specified, it uses dimension 100. It is highly reccomended to run the script using PyPy. GitHub View Github    

Read more

A Python project for reporting DDoS attacks on your Tube-Hosing.com server to a Discord webhook

TubeHostingAttackNotifier is a Python project for reporting DDoS attacks on your Tube-Hosing.com server to a Discord webhook. Installation Using Docker ! to run this script using Docker, you already need a Docker installation ! keep this in mind, when you execute the following commands git clone https://github.com/Lennart01/TubeHostingAttackNotifier cd TubeHostingAttackNotifier docker build -t thacknoti . docker run -d –name TubeHostingAttackNotifier -e [email protected] -e [email protected] -e url=https://discord.com/yourWebhookUrl thacknoti Now you should    

Read more

Attack SQL Server through gopher protocol

usage: main.py [-h] –username USERNAME –password PASSWORD –database DATABASE –query QUERY Attack SQL Server through gopher protocol optional arguments: -h, –help show this help message and exit –username USERNAME, -u USERNAME mssql username –password PASSWORD, -p PASSWORD mssql password –database DATABASE, -d DATABASE mssql database name –query QUERY, -q QUERY mssql sql query statement    

Read more

Usage of frwk_51pwn for attacking targets without prior mutual consent is illegal

Legal Disclaimer Usage of frwk_51pwn for attacking targets without prior mutual consent is illegal.frwk_51pwn is for security testing purposes only 法律免责声明 未经事先双方同意,使用 frwk_51pwn 攻击目标是非法的。frwk_51pwn 仅用于安全测试目的 Overview frwk_51pwn is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the 51pwn Team.It comes with a powerful proof-of-concept engine, many powerful features for the ultimate penetration testers and security researchers. Features PoC scripts can running with attack,verify, shell mode in different way Plugin ecosystem Dynamic loading PoC script from any where […]

Read more

A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environment

A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers (PLCs) within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address. git clone https://github.com/RoseSecurity/Automator-Terminator.git cd /Automator-Terminator pip3 install -r requirements.txt python3 AutomatorTerminator.py A PROGRAMMABLE LOGIC CONTROLLER (PLC) is an industrial computer control system that continuously monitors the state of input devices and makes decisions based upon a custom program to control the state […]

Read more

A Python framework for adversarial attacks and model training in NLP

TextAttack TextAttack is a Python framework for adversarial attacks, data augmentation, and model training in NLP. If you’re looking for information about TextAttack’s menagerie of pre-trained models, you might want the TextAttack Model Zoo page. Slack Channel For help and realtime updates related to TextAttack, please join the TextAttack Slack! Why TextAttack? There are lots of reasons to use TextAttack: Understand NLP models better by running different adversarial attacks on them and examining the output Research and develop different NLP […]

Read more