Skip to content
View MysterionRise's full-sized avatar

Block or report MysterionRise

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
260 results for source starred repositories
Clear filter

Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secret data into audio files. The application also enables you to…

158 10 Updated Apr 15, 2024

A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.

Rust 669 77 Updated Jun 18, 2024

Educational framework exploring ergonomic, lightweight multi-agent orchestration. Managed by OpenAI Solution team.

Python 15,720 1,529 Updated Oct 15, 2024

detect stegano-hidden data in PNG & BMP

Ruby 1,313 141 Updated Mar 25, 2024

⚡ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡

C++ 1,030 111 Updated Oct 10, 2023

The Official Bash Bunny Payload Repository

PowerShell 2,637 1,464 Updated Oct 2, 2024

Trustworthy AI: From Theory to Practice book. Explore the intersection of ethics and technology with 'Trustworthy AI: From Theory to Practice.' This comprehensive guide delves into creating AI mode…

Jupyter Notebook 5 1 Updated Feb 23, 2024

A beginner friendly repository for getting started with adversarial machine learning in PyTorch

Jupyter Notebook 23 4 Updated Apr 20, 2022

As seen at DEF CON and O'Reilly Live Trainings

Jupyter Notebook 23 5 Updated Oct 25, 2023

Reading list of more resources to learn about Adversarial Attacks on AI Systems

28 1 Updated Oct 30, 2024

Adversarial machine learning for a DNN for malware classification

Python 1 Updated Jan 25, 2023

Adversarial ML projects.

Python 2 Updated Sep 17, 2021

A System-Oriented Wargame Framework for Adversarial ML

Python 11 1 Updated Apr 24, 2023

An awesome & curated list of best LLMOps tools for developers

Shell 3,965 380 Updated Oct 10, 2024

[ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"

Python 66 3 Updated Nov 28, 2023

AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models

Python 43 1 Updated Apr 8, 2024

Repository for the Paper: Refusing Safe Prompts for Multi-modal Large Language Models

Python 10 Updated Oct 16, 2024

[Arxiv 2024] Adversarial attacks on multimodal agents

Python 37 4 Updated Jun 28, 2024

[ICML2024] Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast

Python 88 12 Updated Mar 26, 2024

Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models

Python 180 16 Updated May 13, 2024

This repository includes samples of audio provided to different chatbots. Some of these samples have been modified to contain concealed messages. When these altered audios are converted by an audio…

3 1 Updated May 8, 2024

A side channel attack on the acoustic signal of the typing sounds in order to get the typed data and produce smart dictionary attacks on passwords

Python 19 5 Updated Mar 13, 2019

[ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking Multimodal Large Language Models''

Python 21 3 Updated Oct 17, 2024

PhD/MSc course on Machine Learning Security (Univ. Cagliari)

Jupyter Notebook 198 23 Updated Nov 7, 2024

AIBOM Workshop at SBOM-a-Rama (Fall 2024)

4 Updated Sep 13, 2024

USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories

JavaScript 239 53 Updated May 4, 2024

Windows Events Attack Samples

HTML 2,244 398 Updated Jan 24, 2023

An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.

Python 150 13 Updated Oct 20, 2024

This is a collection of awesome papers I have read (carefully or roughly) in the fields of security in diffusion models. Any suggestions and comments are welcome ([email protected]).

20 1 Updated Nov 2, 2024

[CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu

Python 22 2 Updated Aug 27, 2024
Next