Skip to content
#

adversarial-attacks

Here are 606 public repositories matching this topic...

A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discovery, bayesian rule-mining, description for diversity/explanation/interpretability. Analysis of incorporating label feedback with ensemble and tree-based detectors. Includes adversarial attacks with Graph Convol…

  • Updated May 22, 2024
  • Python

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.

  • Updated Sep 24, 2025
  • Python

Improve this page

Add a description, image, and links to the adversarial-attacks topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the adversarial-attacks topic, visit your repo's landing page and select "manage topics."

Learn more