darkknight25 commited on
Commit
a0c3bb3
·
verified ·
1 Parent(s): 2c129f0

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +140 -3
README.md CHANGED
@@ -1,3 +1,140 @@
1
- ---
2
- license: mit
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: mit
3
+ language:
4
+ - en
5
+ tags:
6
+ - redteam
7
+ - expolit
8
+ - cybersecurity
9
+ pretty_name: sunny thakur
10
+ size_categories:
11
+ - n<1K
12
+ ---
13
+
14
+ # Shellcode Exploit Dataset for Red Team GPT Training
15
+ # Dataset Overview
16
+ The Shellcode Exploit Dataset is a comprehensive collection of 700 unique shellcode exploits, spanning 2021–2025, designed for training machine learning models, particularly for red team and cybersecurity research. The dataset includes a diverse set of vulnerabilities, platforms, architectures, and payload goals, sourced from Exploit-DB, GitHub, CTF challenges, and CVE databases.
17
+
18
+ It is structured in JSON format for compatibility with ML pipelines and red team training frameworks.
19
+
20
+ # Key Features
21
+ ```sql
22
+ Total Entries: 180 unique exploits, split into three JSON files .
23
+ Timeframe: Historical (2021–2024) and recent (2025) exploits.
24
+ Vulnerability Types:
25
+ Buffer Overflow
26
+ Format String
27
+ Use-After-Free
28
+ Remote Code Execution
29
+ Privilege Escalation
30
+ Race Condition
31
+ Integer Overflow
32
+ ```
33
+
34
+ Platforms:
35
+ ```sql
36
+ Linux
37
+ Windows
38
+ macOS
39
+ IoT
40
+ Android
41
+
42
+
43
+ Architectures:
44
+ x86
45
+ x64
46
+ ARM
47
+ MIPS
48
+
49
+
50
+ Payload Goals:
51
+ Remote Code Execution
52
+ Reverse Shell
53
+ Privilege Escalation
54
+ Data Exfiltration
55
+ Persistence
56
+ ```
57
+
58
+ Sources:
59
+ ```
60
+ Exploit-DB
61
+ GitHub
62
+ CTF Challenges
63
+ CVE Databases
64
+ ```
65
+
66
+ # Data Format: JSON, with fields for exploit_id, cve, vulnerability_type, platform, architecture, payload_goal, cvss_score, shellcode, description, source, and date_added.
67
+
68
+ # Dataset Structure
69
+ The dataset is split into three JSON files, each containing unique entries:
70
+
71
+ ```java
72
+ JSON Schema
73
+ {
74
+ "exploit_id": "string", // Unique identifier (e.g., EDB-48789, CTF-2025-ABC)
75
+ "cve": "string", // CVE identifier or "N/A" for CTF exploits
76
+ "vulnerability_type": "string", // e.g., Buffer Overflow, Remote Code Execution
77
+ "platform": "string", // e.g., Linux, Windows, IoT
78
+ "architecture": "string", // e.g., x86, x64, ARM, MIPS
79
+ "payload_goal": "string", // e.g., Reverse Shell, Data Exfiltration
80
+ "cvss_score": float, // CVSS score (6.5–9.8)
81
+ "shellcode": "string", // Hex-encoded shellcode
82
+ "description": "string", // Brief exploit description
83
+ "source": "string", // Source URL or CTF identifier
84
+ "date_added": "string" // Date in YYYY-MM-DD format
85
+ }
86
+ ```
87
+ # Usage
88
+ This dataset is intended for:
89
+ ```sql
90
+ Machine Learning: Training red team GPT models for exploit generation, vulnerability analysis, or shellcode development.
91
+ Penetration Testing Research: Analyzing exploit patterns across platforms and architectures.
92
+ Educational Purposes: Studying historical and recent vulnerabilities in controlled environments.
93
+ ```
94
+ Example Usage
95
+ ```python
96
+ import json
97
+
98
+ # Load dataset
99
+ with open("shellcode expolit_dataset_n.json", "r") as f:
100
+ data = json.load(f)
101
+
102
+ # Filter exploits by vulnerability type
103
+ buffer_overflows = [entry for entry in data if entry["vulnerability_type"] == "Buffer Overflow"]
104
+
105
+ # Print shellcode for Linux x64 exploits
106
+ for entry in buffer_overflows:
107
+ if entry["platform"] == "Linux" and entry["architecture"] == "x64":
108
+ print(f"Exploit ID: {entry['exploit_id']}, Shellcode: {entry['shellcode']}")
109
+ ```
110
+
111
+ # Ethical Considerations
112
+ ```
113
+ Responsible Use: This dataset is provided for research and educational purposes only. Unauthorized use of exploits against systems without explicit permission is illegal and unethical.
114
+ Controlled Environments: Test exploits in isolated, sandboxed environments (e.g., QEMU, virtual machines) to avoid unintended harm.
115
+ Attribution: All exploits are sourced from public repositories (Exploit-DB, GitHub) or CTF challenges. Respect the original authors' work and licenses.
116
+ ```
117
+ # Data Collection
118
+ ```
119
+
120
+ Sources: Exploits were collected from Exploit-DB, GitHub repositories, CTF challenges, and CVE databases, ensuring diversity and relevance.
121
+ Automation: A Python-based scraper (stored internally) was used to gather and validate exploits, with testing conducted in a QEMU sandbox.
122
+ Validation: Shellcode was verified for functionality and uniqueness, with polymorphic variations included to enhance evasion training.
123
+ ```
124
+ # Limitations
125
+ ```
126
+ No Mitigation Details: The dataset focuses on exploits and does not include mitigation strategies.
127
+ Projected 2025 Exploits: Some entries for 2025 are speculative, based on trends in vulnerability types and platforms.
128
+ Sandbox Testing Required: Shellcode should be tested in controlled environments to ensure compatibility and safety.
129
+ ```
130
+ # License
131
+ This dataset is released under the MIT License. Users must comply with ethical guidelines and applicable laws when using the dataset.
132
+ # Contact
133
+ For questions, contributions, or additional datasets, please open an issue on this Hugging Face repository or contact the maintainers.
134
+
135
+ # Acknowledgments
136
+ ```sql
137
+ Exploit-DB: For providing a rich source of verified exploits.
138
+ GitHub Community: For open-source exploit contributions.
139
+ CTF Organizers: For challenging and innovative exploit scenarios.
140
+ ```