GorkaAbad
Ph.D. student in Adversarial Machine Learning mainly focused on backdoor attacks.
Radboud UniversityBasque Country
GorkaAbad's Stars
ashishpatel26/500-AI-Machine-learning-Deep-learning-Computer-vision-NLP-Projects-with-code
500 AI Machine learning Deep learning Computer vision NLP Projects with code
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
hindupuravinash/the-gan-zoo
A list of all named GANs!
jpillora/chisel
A fast TCP/UDP tunnel over HTTP
threat9/routersploit
Exploitation Framework for Embedded Devices
OpenMined/PySyft
Perform data science on data that remains in someone else's server
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
FederatedAI/FATE
An Industrial Grade Federated Learning Framework
michenriksen/aquatone
A Tool for Domain Flyovers
Trusted-AI/adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
F5OEO/rpitx
RF transmitter for Raspberry Pi
flozz/p0wny-shell
Single-file PHP shell
anopara/genetic-drawing
A genetic algorithm toy project for drawing
cazala/coin-hive
CoinHive cryptocurrency miner for node.js
zaytoun/scihub.py
Python API and command-line tool for Sci-Hub
deptofdefense/hack-a-sat-library
Public library of space documents and tutorials
sophos/SOREL-20M
Sophos-ReversingLabs 20 million sample dataset
moxie0/sslsniff
A tool for automated MITM attacks on SSL connections.
johnjhacking/Buffer-Overflow-Guide
This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for TheCyberMentor's walkthrough. Please watch his walkthrough if you're confused. Feel free to implement Pull Requests or raise Issues.
scrtlabs/SecretNetwork
𝕊 The Secret Network
IBM/federated-learning-lib
A library for federated learning (a distributed machine learning process) in an enterprise environment.
keenerd/rtl-sdr
RTL-SDR experimental branch
ebagdasa/backdoor_federated_learning
Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)
eried/Research
My personal repository for findings and things to remember
pralab/secml
A Python library for Secure and Explainable Machine Learning
mahmoods01/accessorize-to-a-crime
Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition." In Proc. CCS, 2016.
jofpin/sack
Identify connection of sessions for social engineering attacks.
mahmoods01/agns
Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Objectives." In ACM TOPS, 2019.
iota-community/channels-examples
Sample code for IOTA Channels
samuel-rufi/maml
MAM Lite - a more flexible messaging protocol for IOTA