--- license: mit language: - en tags: - redteam - expolit - cybersecurity pretty_name: sunny thakur size_categories: - n<1K --- # Shellcode Exploit Dataset for Red Team GPT Training # Dataset Overview The Shellcode Exploit Dataset is a comprehensive collection of 700 unique shellcode exploits, spanning 2021–2025, designed for training machine learning models, particularly for red team and cybersecurity research. The dataset includes a diverse set of vulnerabilities, platforms, architectures, and payload goals, sourced from Exploit-DB, GitHub, CTF challenges, and CVE databases. It is structured in JSON format for compatibility with ML pipelines and red team training frameworks. # Key Features ```sql Total Entries: 180 unique exploits, split into three JSON files . Timeframe: Historical (2021–2024) and recent (2025) exploits. Vulnerability Types: Buffer Overflow Format String Use-After-Free Remote Code Execution Privilege Escalation Race Condition Integer Overflow ``` Platforms: ```sql Linux Windows macOS IoT Android Architectures: x86 x64 ARM MIPS Payload Goals: Remote Code Execution Reverse Shell Privilege Escalation Data Exfiltration Persistence ``` Sources: ``` Exploit-DB GitHub CTF Challenges CVE Databases ``` # Data Format: JSON, with fields for exploit_id, cve, vulnerability_type, platform, architecture, payload_goal, cvss_score, shellcode, description, source, and date_added. # Dataset Structure The dataset is split into three JSON files, each containing unique entries: ```java JSON Schema { "exploit_id": "string", // Unique identifier (e.g., EDB-48789, CTF-2025-ABC) "cve": "string", // CVE identifier or "N/A" for CTF exploits "vulnerability_type": "string", // e.g., Buffer Overflow, Remote Code Execution "platform": "string", // e.g., Linux, Windows, IoT "architecture": "string", // e.g., x86, x64, ARM, MIPS "payload_goal": "string", // e.g., Reverse Shell, Data Exfiltration "cvss_score": float, // CVSS score (6.5–9.8) "shellcode": "string", // Hex-encoded shellcode "description": "string", // Brief exploit description "source": "string", // Source URL or CTF identifier "date_added": "string" // Date in YYYY-MM-DD format } ``` # Usage This dataset is intended for: ```sql Machine Learning: Training red team GPT models for exploit generation, vulnerability analysis, or shellcode development. Penetration Testing Research: Analyzing exploit patterns across platforms and architectures. Educational Purposes: Studying historical and recent vulnerabilities in controlled environments. ``` Example Usage ```python import json # Load dataset with open("shellcode expolit_dataset_n.json", "r") as f: data = json.load(f) # Filter exploits by vulnerability type buffer_overflows = [entry for entry in data if entry["vulnerability_type"] == "Buffer Overflow"] # Print shellcode for Linux x64 exploits for entry in buffer_overflows: if entry["platform"] == "Linux" and entry["architecture"] == "x64": print(f"Exploit ID: {entry['exploit_id']}, Shellcode: {entry['shellcode']}") ``` # Ethical Considerations ``` Responsible Use: This dataset is provided for research and educational purposes only. Unauthorized use of exploits against systems without explicit permission is illegal and unethical. Controlled Environments: Test exploits in isolated, sandboxed environments (e.g., QEMU, virtual machines) to avoid unintended harm. Attribution: All exploits are sourced from public repositories (Exploit-DB, GitHub) or CTF challenges. Respect the original authors' work and licenses. ``` # Data Collection ``` Sources: Exploits were collected from Exploit-DB, GitHub repositories, CTF challenges, and CVE databases, ensuring diversity and relevance. Automation: A Python-based scraper (stored internally) was used to gather and validate exploits, with testing conducted in a QEMU sandbox. Validation: Shellcode was verified for functionality and uniqueness, with polymorphic variations included to enhance evasion training. ``` # Limitations ``` No Mitigation Details: The dataset focuses on exploits and does not include mitigation strategies. Projected 2025 Exploits: Some entries for 2025 are speculative, based on trends in vulnerability types and platforms. Sandbox Testing Required: Shellcode should be tested in controlled environments to ensure compatibility and safety. ``` # License This dataset is released under the MIT License. Users must comply with ethical guidelines and applicable laws when using the dataset. # Contact For questions, contributions, or additional datasets, please open an issue on this Hugging Face repository or contact the maintainers. # Acknowledgments ```sql Exploit-DB: For providing a rich source of verified exploits. GitHub Community: For open-source exploit contributions. CTF Organizers: For challenging and innovative exploit scenarios. ```