|
--- |
|
license: mit |
|
language: |
|
- en |
|
tags: |
|
- redteam |
|
- expolit |
|
- cybersecurity |
|
pretty_name: sunny thakur |
|
size_categories: |
|
- n<1K |
|
--- |
|
|
|
# Shellcode Exploit Dataset for Red Team GPT Training |
|
# Dataset Overview |
|
The Shellcode Exploit Dataset is a comprehensive collection of 700 unique shellcode exploits, spanning 2021–2025, designed for training machine learning models, particularly for red team and cybersecurity research. The dataset includes a diverse set of vulnerabilities, platforms, architectures, and payload goals, sourced from Exploit-DB, GitHub, CTF challenges, and CVE databases. |
|
|
|
It is structured in JSON format for compatibility with ML pipelines and red team training frameworks. |
|
|
|
# Key Features |
|
```sql |
|
Total Entries: 180 unique exploits, split into three JSON files . |
|
Timeframe: Historical (2021–2024) and recent (2025) exploits. |
|
Vulnerability Types: |
|
Buffer Overflow |
|
Format String |
|
Use-After-Free |
|
Remote Code Execution |
|
Privilege Escalation |
|
Race Condition |
|
Integer Overflow |
|
``` |
|
|
|
Platforms: |
|
```sql |
|
Linux |
|
Windows |
|
macOS |
|
IoT |
|
Android |
|
|
|
|
|
Architectures: |
|
x86 |
|
x64 |
|
ARM |
|
MIPS |
|
|
|
|
|
Payload Goals: |
|
Remote Code Execution |
|
Reverse Shell |
|
Privilege Escalation |
|
Data Exfiltration |
|
Persistence |
|
``` |
|
|
|
Sources: |
|
``` |
|
Exploit-DB |
|
GitHub |
|
CTF Challenges |
|
CVE Databases |
|
``` |
|
|
|
# Data Format: JSON, with fields for exploit_id, cve, vulnerability_type, platform, architecture, payload_goal, cvss_score, shellcode, description, source, and date_added. |
|
|
|
# Dataset Structure |
|
The dataset is split into three JSON files, each containing unique entries: |
|
|
|
```java |
|
JSON Schema |
|
{ |
|
"exploit_id": "string", // Unique identifier (e.g., EDB-48789, CTF-2025-ABC) |
|
"cve": "string", // CVE identifier or "N/A" for CTF exploits |
|
"vulnerability_type": "string", // e.g., Buffer Overflow, Remote Code Execution |
|
"platform": "string", // e.g., Linux, Windows, IoT |
|
"architecture": "string", // e.g., x86, x64, ARM, MIPS |
|
"payload_goal": "string", // e.g., Reverse Shell, Data Exfiltration |
|
"cvss_score": float, // CVSS score (6.5–9.8) |
|
"shellcode": "string", // Hex-encoded shellcode |
|
"description": "string", // Brief exploit description |
|
"source": "string", // Source URL or CTF identifier |
|
"date_added": "string" // Date in YYYY-MM-DD format |
|
} |
|
``` |
|
# Usage |
|
This dataset is intended for: |
|
```sql |
|
Machine Learning: Training red team GPT models for exploit generation, vulnerability analysis, or shellcode development. |
|
Penetration Testing Research: Analyzing exploit patterns across platforms and architectures. |
|
Educational Purposes: Studying historical and recent vulnerabilities in controlled environments. |
|
``` |
|
Example Usage |
|
```python |
|
import json |
|
|
|
# Load dataset |
|
with open("shellcode expolit_dataset_n.json", "r") as f: |
|
data = json.load(f) |
|
|
|
# Filter exploits by vulnerability type |
|
buffer_overflows = [entry for entry in data if entry["vulnerability_type"] == "Buffer Overflow"] |
|
|
|
# Print shellcode for Linux x64 exploits |
|
for entry in buffer_overflows: |
|
if entry["platform"] == "Linux" and entry["architecture"] == "x64": |
|
print(f"Exploit ID: {entry['exploit_id']}, Shellcode: {entry['shellcode']}") |
|
``` |
|
|
|
# Ethical Considerations |
|
``` |
|
Responsible Use: This dataset is provided for research and educational purposes only. Unauthorized use of exploits against systems without explicit permission is illegal and unethical. |
|
Controlled Environments: Test exploits in isolated, sandboxed environments (e.g., QEMU, virtual machines) to avoid unintended harm. |
|
Attribution: All exploits are sourced from public repositories (Exploit-DB, GitHub) or CTF challenges. Respect the original authors' work and licenses. |
|
``` |
|
# Data Collection |
|
``` |
|
|
|
Sources: Exploits were collected from Exploit-DB, GitHub repositories, CTF challenges, and CVE databases, ensuring diversity and relevance. |
|
Automation: A Python-based scraper (stored internally) was used to gather and validate exploits, with testing conducted in a QEMU sandbox. |
|
Validation: Shellcode was verified for functionality and uniqueness, with polymorphic variations included to enhance evasion training. |
|
``` |
|
# Limitations |
|
``` |
|
No Mitigation Details: The dataset focuses on exploits and does not include mitigation strategies. |
|
Projected 2025 Exploits: Some entries for 2025 are speculative, based on trends in vulnerability types and platforms. |
|
Sandbox Testing Required: Shellcode should be tested in controlled environments to ensure compatibility and safety. |
|
``` |
|
# License |
|
This dataset is released under the MIT License. Users must comply with ethical guidelines and applicable laws when using the dataset. |
|
# Contact |
|
For questions, contributions, or additional datasets, please open an issue on this Hugging Face repository or contact the maintainers. |
|
|
|
# Acknowledgments |
|
```sql |
|
Exploit-DB: For providing a rich source of verified exploits. |
|
GitHub Community: For open-source exploit contributions. |
|
CTF Organizers: For challenging and innovative exploit scenarios. |
|
``` |
|
|