Windows/Linux - ReverseShellBackdoor Framework
-
Updated
Jun 8, 2019 - Python
Windows/Linux - ReverseShellBackdoor Framework
A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRAM, AES-128, and UART designs. These benchmarks were created using the GHOST framework for automated HT insertion
Protect your docker host network from possible trojan horse attack.
FUD Windows Rat written in python, it will get updated every time someone buy the password
Disallow random code injection in Magento 2 trough API or WEB requests for: Order Creation, Customer Creation, Customer Name Update, Customer Address Update
免責聲明 (Disclaimer) 本程式 (以下簡稱「本軟體」) 由使用者自行執行,所有風險由使用者自行承擔。開發者不對因使用或誤用本軟體導致的任何損失、數據丟失、設備損壞或其他問題負責。 使用本軟體即表示您同意以下條款: 本軟體僅供學習、測試或個人用途,禁止用於非法活動。 開發者不保證本軟體的適用性、可靠性或安全性。 使用者需自行承擔因使用本軟體所造成的任何後果,包括但不限於系統錯誤、數據遺失或法律責任。 若您不同意本免責聲明,請勿使用本軟體,並立即刪除相關文件。
Bayesian optimization for machine learning model compromise detection
This is an Android spyware app/Trojan horse that exploits the WorkManager() process in Android to carry out clandestine operations in the background like data exfiltration and DoS attacks. It's part of research findings presented at The 12th International Symposium on Digital Forensics and Security (ISDFS 2024), at San Antonio, Texas.
This is a Command and Control (C2) server for an Android spyware app that stores exfiltrated data and allows the user to view and issue DoS attack commands remotely to the Android spyware app. It's part of research findings presented at The 12th International Symposium on Digital Forensics and Security (ISDFS 2024), at San Antonio, TX.
Add a description, image, and links to the trojan-horse-attack topic page so that developers can more easily learn about it.
To associate your repository with the trojan-horse-attack topic, visit your repo's landing page and select "manage topics."