Update README.md
Browse files
README.md
CHANGED
|
@@ -1,3 +1,140 @@
|
|
| 1 |
-
---
|
| 2 |
-
license: mit
|
| 3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: mit
|
| 3 |
+
language:
|
| 4 |
+
- en
|
| 5 |
+
tags:
|
| 6 |
+
- redteam
|
| 7 |
+
- expolit
|
| 8 |
+
- cybersecurity
|
| 9 |
+
pretty_name: sunny thakur
|
| 10 |
+
size_categories:
|
| 11 |
+
- n<1K
|
| 12 |
+
---
|
| 13 |
+
|
| 14 |
+
# Shellcode Exploit Dataset for Red Team GPT Training
|
| 15 |
+
# Dataset Overview
|
| 16 |
+
The Shellcode Exploit Dataset is a comprehensive collection of 700 unique shellcode exploits, spanning 2021–2025, designed for training machine learning models, particularly for red team and cybersecurity research. The dataset includes a diverse set of vulnerabilities, platforms, architectures, and payload goals, sourced from Exploit-DB, GitHub, CTF challenges, and CVE databases.
|
| 17 |
+
|
| 18 |
+
It is structured in JSON format for compatibility with ML pipelines and red team training frameworks.
|
| 19 |
+
|
| 20 |
+
# Key Features
|
| 21 |
+
```sql
|
| 22 |
+
Total Entries: 180 unique exploits, split into three JSON files .
|
| 23 |
+
Timeframe: Historical (2021–2024) and recent (2025) exploits.
|
| 24 |
+
Vulnerability Types:
|
| 25 |
+
Buffer Overflow
|
| 26 |
+
Format String
|
| 27 |
+
Use-After-Free
|
| 28 |
+
Remote Code Execution
|
| 29 |
+
Privilege Escalation
|
| 30 |
+
Race Condition
|
| 31 |
+
Integer Overflow
|
| 32 |
+
```
|
| 33 |
+
|
| 34 |
+
Platforms:
|
| 35 |
+
```sql
|
| 36 |
+
Linux
|
| 37 |
+
Windows
|
| 38 |
+
macOS
|
| 39 |
+
IoT
|
| 40 |
+
Android
|
| 41 |
+
|
| 42 |
+
|
| 43 |
+
Architectures:
|
| 44 |
+
x86
|
| 45 |
+
x64
|
| 46 |
+
ARM
|
| 47 |
+
MIPS
|
| 48 |
+
|
| 49 |
+
|
| 50 |
+
Payload Goals:
|
| 51 |
+
Remote Code Execution
|
| 52 |
+
Reverse Shell
|
| 53 |
+
Privilege Escalation
|
| 54 |
+
Data Exfiltration
|
| 55 |
+
Persistence
|
| 56 |
+
```
|
| 57 |
+
|
| 58 |
+
Sources:
|
| 59 |
+
```
|
| 60 |
+
Exploit-DB
|
| 61 |
+
GitHub
|
| 62 |
+
CTF Challenges
|
| 63 |
+
CVE Databases
|
| 64 |
+
```
|
| 65 |
+
|
| 66 |
+
# Data Format: JSON, with fields for exploit_id, cve, vulnerability_type, platform, architecture, payload_goal, cvss_score, shellcode, description, source, and date_added.
|
| 67 |
+
|
| 68 |
+
# Dataset Structure
|
| 69 |
+
The dataset is split into three JSON files, each containing unique entries:
|
| 70 |
+
|
| 71 |
+
```java
|
| 72 |
+
JSON Schema
|
| 73 |
+
{
|
| 74 |
+
"exploit_id": "string", // Unique identifier (e.g., EDB-48789, CTF-2025-ABC)
|
| 75 |
+
"cve": "string", // CVE identifier or "N/A" for CTF exploits
|
| 76 |
+
"vulnerability_type": "string", // e.g., Buffer Overflow, Remote Code Execution
|
| 77 |
+
"platform": "string", // e.g., Linux, Windows, IoT
|
| 78 |
+
"architecture": "string", // e.g., x86, x64, ARM, MIPS
|
| 79 |
+
"payload_goal": "string", // e.g., Reverse Shell, Data Exfiltration
|
| 80 |
+
"cvss_score": float, // CVSS score (6.5–9.8)
|
| 81 |
+
"shellcode": "string", // Hex-encoded shellcode
|
| 82 |
+
"description": "string", // Brief exploit description
|
| 83 |
+
"source": "string", // Source URL or CTF identifier
|
| 84 |
+
"date_added": "string" // Date in YYYY-MM-DD format
|
| 85 |
+
}
|
| 86 |
+
```
|
| 87 |
+
# Usage
|
| 88 |
+
This dataset is intended for:
|
| 89 |
+
```sql
|
| 90 |
+
Machine Learning: Training red team GPT models for exploit generation, vulnerability analysis, or shellcode development.
|
| 91 |
+
Penetration Testing Research: Analyzing exploit patterns across platforms and architectures.
|
| 92 |
+
Educational Purposes: Studying historical and recent vulnerabilities in controlled environments.
|
| 93 |
+
```
|
| 94 |
+
Example Usage
|
| 95 |
+
```python
|
| 96 |
+
import json
|
| 97 |
+
|
| 98 |
+
# Load dataset
|
| 99 |
+
with open("shellcode expolit_dataset_n.json", "r") as f:
|
| 100 |
+
data = json.load(f)
|
| 101 |
+
|
| 102 |
+
# Filter exploits by vulnerability type
|
| 103 |
+
buffer_overflows = [entry for entry in data if entry["vulnerability_type"] == "Buffer Overflow"]
|
| 104 |
+
|
| 105 |
+
# Print shellcode for Linux x64 exploits
|
| 106 |
+
for entry in buffer_overflows:
|
| 107 |
+
if entry["platform"] == "Linux" and entry["architecture"] == "x64":
|
| 108 |
+
print(f"Exploit ID: {entry['exploit_id']}, Shellcode: {entry['shellcode']}")
|
| 109 |
+
```
|
| 110 |
+
|
| 111 |
+
# Ethical Considerations
|
| 112 |
+
```
|
| 113 |
+
Responsible Use: This dataset is provided for research and educational purposes only. Unauthorized use of exploits against systems without explicit permission is illegal and unethical.
|
| 114 |
+
Controlled Environments: Test exploits in isolated, sandboxed environments (e.g., QEMU, virtual machines) to avoid unintended harm.
|
| 115 |
+
Attribution: All exploits are sourced from public repositories (Exploit-DB, GitHub) or CTF challenges. Respect the original authors' work and licenses.
|
| 116 |
+
```
|
| 117 |
+
# Data Collection
|
| 118 |
+
```
|
| 119 |
+
|
| 120 |
+
Sources: Exploits were collected from Exploit-DB, GitHub repositories, CTF challenges, and CVE databases, ensuring diversity and relevance.
|
| 121 |
+
Automation: A Python-based scraper (stored internally) was used to gather and validate exploits, with testing conducted in a QEMU sandbox.
|
| 122 |
+
Validation: Shellcode was verified for functionality and uniqueness, with polymorphic variations included to enhance evasion training.
|
| 123 |
+
```
|
| 124 |
+
# Limitations
|
| 125 |
+
```
|
| 126 |
+
No Mitigation Details: The dataset focuses on exploits and does not include mitigation strategies.
|
| 127 |
+
Projected 2025 Exploits: Some entries for 2025 are speculative, based on trends in vulnerability types and platforms.
|
| 128 |
+
Sandbox Testing Required: Shellcode should be tested in controlled environments to ensure compatibility and safety.
|
| 129 |
+
```
|
| 130 |
+
# License
|
| 131 |
+
This dataset is released under the MIT License. Users must comply with ethical guidelines and applicable laws when using the dataset.
|
| 132 |
+
# Contact
|
| 133 |
+
For questions, contributions, or additional datasets, please open an issue on this Hugging Face repository or contact the maintainers.
|
| 134 |
+
|
| 135 |
+
# Acknowledgments
|
| 136 |
+
```sql
|
| 137 |
+
Exploit-DB: For providing a rich source of verified exploits.
|
| 138 |
+
GitHub Community: For open-source exploit contributions.
|
| 139 |
+
CTF Organizers: For challenging and innovative exploit scenarios.
|
| 140 |
+
```
|