-
Hello,
how to block vulnerability scanner such as Acunetix, OWASP ZAP, nikto, wp-scan, Netsparker, etc.. ?
they do the user-agent manipulation so, it may need some tricks to keep them away.
Pleas…
-
### Summary of the problem
**1. What does “pc”(world.current_vm.pc) mean?Why is it an integer?**
2. In the Detect Reentrancy Advanced annotation:“A _successful_ call to an attacker address (addres…
-
### The purpose and use-cases of the new component
Many receivers and exporters require credentials that deployers want to keep confidential, particularly when collectors are deployed to systems wher…
-
### Project to be claimed
`scikit-optimize`: https://pypi.org/project/scikit-optimize
### Your PyPI username
`fkiraly`: https://pypi.org/user/fkiraly
### Reasons for the request
`scikit…
-
from tqdm import tqdm
from textattack.loggers import CSVLogger
from textattack.attack_results import SuccessfulAttackResult
from textattack import Attacker
from textattack import AttackArgs
from …
buthi updated
9 months ago
-
## 一言でいうと
道路標識を誤認させるサンプルを作成するという研究。生成した停止の標識のサンプル(をプリントしたもの)を、速度制限の標識に100%誤認させることが可能だったという結果。手法としては誤認識させる最小かつ印刷可能な変動を、標識の範囲内のみという制約(Mask)をかけて計算している。
### 論文リンク
https://arxiv.org/abs/1707.08945…
-
Hello,
I am getting this error "Failed to retrieve endpoints from the source..." while trying to discover application endpoints regardless of the format i.e dir/zip/War. I am using the Attack Surf…
-
Diffusion Deepfake
https://arxiv.org/abs/2404.01579
-
Hi there,
I would like to implement a detector for the following vulnerability if it is in the scope. [CVE-2024-27198](https://github.com/advisories/GHSA-xh94-49wq-7h2h) JetBrains TeamCity Unauthe…
-
Hi,
It is a nice work. Have you ever tried it on the images of large size? I tried the method on 224*224 images and found that the gap between clean images and adversarial ones hard to enlarge. Fo…