darkknight25's picture
Update README.md
a0c3bb3 verified
---
license: mit
language:
- en
tags:
- redteam
- expolit
- cybersecurity
pretty_name: sunny thakur
size_categories:
- n<1K
---
# Shellcode Exploit Dataset for Red Team GPT Training
# Dataset Overview
The Shellcode Exploit Dataset is a comprehensive collection of 700 unique shellcode exploits, spanning 2021–2025, designed for training machine learning models, particularly for red team and cybersecurity research. The dataset includes a diverse set of vulnerabilities, platforms, architectures, and payload goals, sourced from Exploit-DB, GitHub, CTF challenges, and CVE databases.
It is structured in JSON format for compatibility with ML pipelines and red team training frameworks.
# Key Features
```sql
Total Entries: 180 unique exploits, split into three JSON files .
Timeframe: Historical (2021–2024) and recent (2025) exploits.
Vulnerability Types:
Buffer Overflow
Format String
Use-After-Free
Remote Code Execution
Privilege Escalation
Race Condition
Integer Overflow
```
Platforms:
```sql
Linux
Windows
macOS
IoT
Android
Architectures:
x86
x64
ARM
MIPS
Payload Goals:
Remote Code Execution
Reverse Shell
Privilege Escalation
Data Exfiltration
Persistence
```
Sources:
```
Exploit-DB
GitHub
CTF Challenges
CVE Databases
```
# Data Format: JSON, with fields for exploit_id, cve, vulnerability_type, platform, architecture, payload_goal, cvss_score, shellcode, description, source, and date_added.
# Dataset Structure
The dataset is split into three JSON files, each containing unique entries:
```java
JSON Schema
{
"exploit_id": "string", // Unique identifier (e.g., EDB-48789, CTF-2025-ABC)
"cve": "string", // CVE identifier or "N/A" for CTF exploits
"vulnerability_type": "string", // e.g., Buffer Overflow, Remote Code Execution
"platform": "string", // e.g., Linux, Windows, IoT
"architecture": "string", // e.g., x86, x64, ARM, MIPS
"payload_goal": "string", // e.g., Reverse Shell, Data Exfiltration
"cvss_score": float, // CVSS score (6.5–9.8)
"shellcode": "string", // Hex-encoded shellcode
"description": "string", // Brief exploit description
"source": "string", // Source URL or CTF identifier
"date_added": "string" // Date in YYYY-MM-DD format
}
```
# Usage
This dataset is intended for:
```sql
Machine Learning: Training red team GPT models for exploit generation, vulnerability analysis, or shellcode development.
Penetration Testing Research: Analyzing exploit patterns across platforms and architectures.
Educational Purposes: Studying historical and recent vulnerabilities in controlled environments.
```
Example Usage
```python
import json
# Load dataset
with open("shellcode expolit_dataset_n.json", "r") as f:
data = json.load(f)
# Filter exploits by vulnerability type
buffer_overflows = [entry for entry in data if entry["vulnerability_type"] == "Buffer Overflow"]
# Print shellcode for Linux x64 exploits
for entry in buffer_overflows:
if entry["platform"] == "Linux" and entry["architecture"] == "x64":
print(f"Exploit ID: {entry['exploit_id']}, Shellcode: {entry['shellcode']}")
```
# Ethical Considerations
```
Responsible Use: This dataset is provided for research and educational purposes only. Unauthorized use of exploits against systems without explicit permission is illegal and unethical.
Controlled Environments: Test exploits in isolated, sandboxed environments (e.g., QEMU, virtual machines) to avoid unintended harm.
Attribution: All exploits are sourced from public repositories (Exploit-DB, GitHub) or CTF challenges. Respect the original authors' work and licenses.
```
# Data Collection
```
Sources: Exploits were collected from Exploit-DB, GitHub repositories, CTF challenges, and CVE databases, ensuring diversity and relevance.
Automation: A Python-based scraper (stored internally) was used to gather and validate exploits, with testing conducted in a QEMU sandbox.
Validation: Shellcode was verified for functionality and uniqueness, with polymorphic variations included to enhance evasion training.
```
# Limitations
```
No Mitigation Details: The dataset focuses on exploits and does not include mitigation strategies.
Projected 2025 Exploits: Some entries for 2025 are speculative, based on trends in vulnerability types and platforms.
Sandbox Testing Required: Shellcode should be tested in controlled environments to ensure compatibility and safety.
```
# License
This dataset is released under the MIT License. Users must comply with ethical guidelines and applicable laws when using the dataset.
# Contact
For questions, contributions, or additional datasets, please open an issue on this Hugging Face repository or contact the maintainers.
# Acknowledgments
```sql
Exploit-DB: For providing a rich source of verified exploits.
GitHub Community: For open-source exploit contributions.
CTF Organizers: For challenging and innovative exploit scenarios.
```