Windows/Linux - ReverseShellBackdoor Framework
-
Updated
Jun 8, 2019 - Python
Windows/Linux - ReverseShellBackdoor Framework
Protect your docker host network from possible trojan horse attack.
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
FUD Windows Rat written in python, it will get updated every time someone buy the password
Bayesian optimization for machine learning model compromise detection
Disallow random code injection in Magento 2 trough API or WEB requests for: Order Creation, Customer Creation, Customer Name Update, Customer Address Update
Add a description, image, and links to the trojan-horse-attack topic page so that developers can more easily learn about it.
To associate your repository with the trojan-horse-attack topic, visit your repo's landing page and select "manage topics."