| { | |
| "url_phishing_kaggle": { | |
| "name": "Malicious vs Benign URLs (Kaggle)", | |
| "description": "URLs classified as malicious or benign with extracted features", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/hex-plex/Malicious-URL-Classification/master/url_data.csv" | |
| ], | |
| "category": "phishing", | |
| "samples": 450000, | |
| "features": [ | |
| "url", | |
| "url_length", | |
| "hostname_length", | |
| "path_length", | |
| "fd_length", | |
| "tld_count", | |
| "params_count", | |
| "fragment_count", | |
| "suspicious_words", | |
| "digits_ratio", | |
| "special_chars_ratio", | |
| "is_malicious" | |
| ], | |
| "target": "is_malicious", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:00.496780", | |
| "status": "available" | |
| }, | |
| "phishing_websites_uci": { | |
| "name": "UCI Phishing Websites Dataset", | |
| "description": "30 features extracted from phishing and legitimate websites", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv" | |
| ], | |
| "category": "phishing", | |
| "samples": 11055, | |
| "features": [ | |
| "having_ip", | |
| "url_length", | |
| "shortening_service", | |
| "having_at", | |
| "double_slash", | |
| "prefix_suffix", | |
| "sub_domain", | |
| "ssl_final_state", | |
| "domain_registration", | |
| "favicon", | |
| "port", | |
| "https_token", | |
| "result" | |
| ], | |
| "target": "result", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:00.843897", | |
| "status": "available" | |
| }, | |
| "malware_pe_features": { | |
| "name": "PE Header Malware Features", | |
| "description": "Windows PE file features for malware classification", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/urwithajit9/ClaMP/master/dataset/malware.csv" | |
| ], | |
| "category": "malware", | |
| "samples": 4500, | |
| "features": [ | |
| "md5", | |
| "file_size", | |
| "e_lfanew", | |
| "machine", | |
| "sections", | |
| "characteristics", | |
| "timestamp", | |
| "entry_point", | |
| "image_base", | |
| "subsystem", | |
| "dll_characteristics", | |
| "size_of_code", | |
| "size_of_init_data", | |
| "size_of_uninit_data", | |
| "legitimate" | |
| ], | |
| "target": "legitimate", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:01.006557", | |
| "status": "available" | |
| }, | |
| "android_malware_drebin": { | |
| "name": "Android Malware (Drebin-style Features)", | |
| "description": "Android app permission features for malware detection", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/cloudhubs/static-malware-analysis/main/Data/android_data.csv" | |
| ], | |
| "category": "malware", | |
| "samples": 15000, | |
| "features": [ | |
| "pkg_name", | |
| "permissions", | |
| "api_calls", | |
| "intents", | |
| "is_malware" | |
| ], | |
| "target": "is_malware", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:01.484651", | |
| "status": "available" | |
| }, | |
| "cicids2017_ddos": { | |
| "name": "CICIDS 2017 DDoS Detection", | |
| "description": "Network flows with DDoS and benign traffic", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/AbdullahTarique/CICIDS-2017-Dataset/main/Sample/Friday-WorkingHours-Afternoon-DDos.csv" | |
| ], | |
| "category": "intrusion", | |
| "samples": 128000, | |
| "features": [ | |
| "flow_duration", | |
| "total_fwd_packets", | |
| "total_bwd_packets", | |
| "flow_bytes_s", | |
| "flow_packets_s", | |
| "avg_packet_size", | |
| "label" | |
| ], | |
| "target": "label", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:01.913481", | |
| "status": "available" | |
| }, | |
| "nsl_kdd_train": { | |
| "name": "NSL-KDD Network Intrusion", | |
| "description": "Improved KDD Cup 99 dataset for network intrusion detection", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.txt" | |
| ], | |
| "category": "intrusion", | |
| "samples": 125973, | |
| "features": [ | |
| "duration", | |
| "protocol_type", | |
| "service", | |
| "flag", | |
| "src_bytes", | |
| "dst_bytes", | |
| "land", | |
| "wrong_fragment", | |
| "urgent", | |
| "hot", | |
| "num_failed_logins", | |
| "logged_in", | |
| "num_compromised", | |
| "attack_type" | |
| ], | |
| "target": "attack_type", | |
| "format": "txt", | |
| "downloaded_at": "2026-01-29T16:35:02.373654", | |
| "status": "available" | |
| }, | |
| "unsw_nb15": { | |
| "name": "UNSW-NB15 Network Dataset", | |
| "description": "Modern network intrusion dataset with 9 attack types", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/jmnwong/UNSW-NB15/master/UNSW-NB15_1.csv" | |
| ], | |
| "category": "intrusion", | |
| "samples": 175000, | |
| "features": [ | |
| "srcip", | |
| "sport", | |
| "dstip", | |
| "dsport", | |
| "proto", | |
| "state", | |
| "dur", | |
| "sbytes", | |
| "dbytes", | |
| "sttl", | |
| "dttl", | |
| "attack_cat", | |
| "label" | |
| ], | |
| "target": "label", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:02.792570", | |
| "status": "available" | |
| }, | |
| "ipsum_malicious_ips": { | |
| "name": "IPsum Malicious IPs", | |
| "description": "Daily updated list of malicious IP addresses", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt" | |
| ], | |
| "category": "threat_intel", | |
| "samples": 25000, | |
| "features": [ | |
| "ip_address", | |
| "threat_level" | |
| ], | |
| "target": "threat_level", | |
| "format": "txt", | |
| "downloaded_at": "2026-01-29T16:35:03.526227", | |
| "status": "available" | |
| }, | |
| "feodotracker_botnet": { | |
| "name": "Feodo Tracker Botnet C2", | |
| "description": "Botnet Command & Control server IPs", | |
| "urls": [ | |
| "https://feodotracker.abuse.ch/downloads/ipblocklist.csv" | |
| ], | |
| "category": "threat_intel", | |
| "samples": 5000, | |
| "features": [ | |
| "first_seen", | |
| "dst_ip", | |
| "dst_port", | |
| "malware", | |
| "status" | |
| ], | |
| "target": "malware", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:03.907662", | |
| "status": "available" | |
| }, | |
| "urlhaus_malicious": { | |
| "name": "URLhaus Malicious URLs", | |
| "description": "Database of malware distribution URLs", | |
| "urls": [ | |
| "https://urlhaus.abuse.ch/downloads/csv_recent/" | |
| ], | |
| "category": "threat_intel", | |
| "samples": 10000, | |
| "features": [ | |
| "dateadded", | |
| "url", | |
| "url_status", | |
| "threat", | |
| "tags", | |
| "urlhaus_link" | |
| ], | |
| "target": "threat", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:04.832782", | |
| "status": "available" | |
| }, | |
| "spambase_uci": { | |
| "name": "UCI Spambase", | |
| "description": "Email spam classification with word frequencies", | |
| "urls": [ | |
| "https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data" | |
| ], | |
| "category": "spam", | |
| "samples": 4601, | |
| "features": [ | |
| "word_freq_make", | |
| "word_freq_address", | |
| "word_freq_all", | |
| "char_freq_semicolon", | |
| "char_freq_dollar", | |
| "capital_run_avg", | |
| "capital_run_longest", | |
| "capital_run_total", | |
| "is_spam" | |
| ], | |
| "target": "is_spam", | |
| "format": "data", | |
| "downloaded_at": "2026-01-29T16:35:05.124845", | |
| "status": "available" | |
| }, | |
| "xss_payloads": { | |
| "name": "XSS Attack Payloads", | |
| "description": "Cross-site scripting attack patterns", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/payloadbox/xss-payload-list/master/Intruder/xss-payload-list.txt" | |
| ], | |
| "category": "web_attack", | |
| "samples": 5000, | |
| "features": [ | |
| "payload", | |
| "type" | |
| ], | |
| "target": "type", | |
| "format": "txt", | |
| "downloaded_at": "2026-01-29T16:35:05.293648", | |
| "status": "available" | |
| }, | |
| "sql_injection_payloads": { | |
| "name": "SQL Injection Payloads", | |
| "description": "SQL injection attack patterns", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Auth-Bypass.txt", | |
| "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Error-Based.txt" | |
| ], | |
| "category": "web_attack", | |
| "samples": 3000, | |
| "features": [ | |
| "payload", | |
| "injection_type" | |
| ], | |
| "target": "injection_type", | |
| "format": "txt", | |
| "downloaded_at": "2026-01-29T16:35:05.501629", | |
| "status": "available" | |
| }, | |
| "http_csic_requests": { | |
| "name": "HTTP CSIC 2010 Dataset", | |
| "description": "HTTP requests with web attacks (XSS, SQLi, etc.)", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/Morzeux/HttpRequestsDataset/master/csic_http/csic_2010_cleaned.csv" | |
| ], | |
| "category": "web_attack", | |
| "samples": 36000, | |
| "features": [ | |
| "method", | |
| "url", | |
| "protocol", | |
| "content", | |
| "is_attack" | |
| ], | |
| "target": "is_attack", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:05.724490", | |
| "status": "available" | |
| }, | |
| "cryptomining_scripts": { | |
| "name": "Cryptomining Script Detection", | |
| "description": "JavaScript cryptomining patterns", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/ArslanKhan-cs/JSMiner/main/data/cryptominer.csv" | |
| ], | |
| "category": "cryptomining", | |
| "samples": 5000, | |
| "features": [ | |
| "script_hash", | |
| "obfuscated", | |
| "api_calls", | |
| "is_miner" | |
| ], | |
| "target": "is_miner", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:05.924379", | |
| "status": "available" | |
| }, | |
| "dga_domains": { | |
| "name": "DGA Domain Detection", | |
| "description": "Domain Generation Algorithm detection dataset", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/baderj/domain_generation_algorithms/master/dga_db/export/dga_domains_sample.csv" | |
| ], | |
| "category": "dns", | |
| "samples": 50000, | |
| "features": [ | |
| "domain", | |
| "family", | |
| "length", | |
| "entropy", | |
| "consonant_ratio", | |
| "is_dga" | |
| ], | |
| "target": "is_dga", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:06.692993", | |
| "status": "available" | |
| }, | |
| "ssl_certificates": { | |
| "name": "SSL Certificate Analysis", | |
| "description": "SSL certificate features for malicious detection", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/JustinGuese/ML-Security-SSL-Phishing/master/data/SSL-phishing.csv" | |
| ], | |
| "category": "ssl", | |
| "samples": 8000, | |
| "features": [ | |
| "cert_issuer", | |
| "cert_validity", | |
| "domain_match", | |
| "is_ev", | |
| "cipher_strength", | |
| "is_phishing" | |
| ], | |
| "target": "is_phishing", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:06.841582", | |
| "status": "available" | |
| }, | |
| "system_logs_hdfs": { | |
| "name": "HDFS System Logs", | |
| "description": "Hadoop system logs for anomaly detection", | |
| "urls": [ | |
| "https://raw.githubusercontent.com/logpai/loghub/master/HDFS/HDFS.log_structured.csv" | |
| ], | |
| "category": "logs", | |
| "samples": 11000, | |
| "features": [ | |
| "timestamp", | |
| "level", | |
| "component", | |
| "content", | |
| "event_template" | |
| ], | |
| "target": "level", | |
| "format": "csv", | |
| "downloaded_at": "2026-01-29T16:35:07.926689", | |
| "status": "available" | |
| } | |
| } |