Skip to content

Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security

License

Notifications You must be signed in to change notification settings

tigthor/neural-network-hacking

Repository files navigation

Hacking Neural Networks: A Short Introduction

Disclaimer: This article and all the associated exercises are for educational purposes only.

This repository provides a comprehensive introduction to various offensive techniques using neural networks. The methods covered include bug hunting, shellcode obfuscation, information extraction, malware injection, backdooring, and more.

Each method is accompanied by an exercise, allowing you to practice and understand the concepts hands-on. You can find the detailed article here in 'Article.pdf' or on arXiv (arXiv:1911.07658).


Setup

Python and pip

Download and install Python3 and its package installer pip using a package manager or directly from the official website.

Editor

An editor is required to work with the code, preferably one that supports Python syntax highlighting. Some recommended editors are:

Packages

To run the exercises, you will need to install several Python packages:


The exercises

This repository includes a variety of exercises, each focusing on a different aspect of neural network attacks:

  • 0 - Last Layer Attack: Understand and manipulate the last layer of a neural network.
  • 1 - Backdooring: Inject backdoors into neural network models.
  • 2 - Extracting Information: Extract sensitive information from neural networks.
  • 3 - Brute Forcing: Develop brute-force strategies for image-based security.
  • 4 - Neural Overflow: Explore neural network overflow vulnerabilities.
  • 5 - Malware Injection: Inject malware into neural networks.
  • 6 - Neural Obfuscation: Obfuscate neural network operations.
  • 7 - Bug Hunting: Use neural networks to find vulnerabilities in code.
  • 8 - GPU Attack: Attack GPU-based authorization systems.

For detailed instructions, please read the README.md file in each exercise directory.


Further Reading / Watching

For more information on security and machine learning, check out the following resources:


Contributing

Contributions are welcome! If you find errors or missing references, feel free to make a PR or contact me.

How to Contribute

  1. Fork the repository.
  2. Create a new branch (git checkout -b feature-branch).
  3. Make your changes and commit them (git commit -am 'Add new feature').
  4. Push to the branch (git push origin feature-branch).
  5. Create a new Pull Request.

Please ensure that your contributions align with the repository's purpose and follow the established coding standards

What else?

The neural networks found in the exercises are based on the examples provided by keras.

If you find that there are errors or missing references, feel free to make a PR or contact me.

Releases

No releases published

Packages

No packages published

Languages