{ "url_phishing_kaggle": { "name": "Malicious vs Benign URLs (Kaggle)", "description": "URLs classified as malicious or benign with extracted features", "urls": [ "https://raw.githubusercontent.com/hex-plex/Malicious-URL-Classification/master/url_data.csv" ], "category": "phishing", "samples": 450000, "features": [ "url", "url_length", "hostname_length", "path_length", "fd_length", "tld_count", "params_count", "fragment_count", "suspicious_words", "digits_ratio", "special_chars_ratio", "is_malicious" ], "target": "is_malicious", "format": "csv", "downloaded_at": "2026-01-29T16:35:00.496780", "status": "available" }, "phishing_websites_uci": { "name": "UCI Phishing Websites Dataset", "description": "30 features extracted from phishing and legitimate websites", "urls": [ "https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv" ], "category": "phishing", "samples": 11055, "features": [ "having_ip", "url_length", "shortening_service", "having_at", "double_slash", "prefix_suffix", "sub_domain", "ssl_final_state", "domain_registration", "favicon", "port", "https_token", "result" ], "target": "result", "format": "csv", "downloaded_at": "2026-01-29T16:35:00.843897", "status": "available" }, "malware_pe_features": { "name": "PE Header Malware Features", "description": "Windows PE file features for malware classification", "urls": [ "https://raw.githubusercontent.com/urwithajit9/ClaMP/master/dataset/malware.csv" ], "category": "malware", "samples": 4500, "features": [ "md5", "file_size", "e_lfanew", "machine", "sections", "characteristics", "timestamp", "entry_point", "image_base", "subsystem", "dll_characteristics", "size_of_code", "size_of_init_data", "size_of_uninit_data", "legitimate" ], "target": "legitimate", "format": "csv", "downloaded_at": "2026-01-29T16:35:01.006557", "status": "available" }, "android_malware_drebin": { "name": "Android Malware (Drebin-style Features)", "description": "Android app permission features for malware detection", "urls": [ "https://raw.githubusercontent.com/cloudhubs/static-malware-analysis/main/Data/android_data.csv" ], "category": "malware", "samples": 15000, "features": [ "pkg_name", "permissions", "api_calls", "intents", "is_malware" ], "target": "is_malware", "format": "csv", "downloaded_at": "2026-01-29T16:35:01.484651", "status": "available" }, "cicids2017_ddos": { "name": "CICIDS 2017 DDoS Detection", "description": "Network flows with DDoS and benign traffic", "urls": [ "https://raw.githubusercontent.com/AbdullahTarique/CICIDS-2017-Dataset/main/Sample/Friday-WorkingHours-Afternoon-DDos.csv" ], "category": "intrusion", "samples": 128000, "features": [ "flow_duration", "total_fwd_packets", "total_bwd_packets", "flow_bytes_s", "flow_packets_s", "avg_packet_size", "label" ], "target": "label", "format": "csv", "downloaded_at": "2026-01-29T16:35:01.913481", "status": "available" }, "nsl_kdd_train": { "name": "NSL-KDD Network Intrusion", "description": "Improved KDD Cup 99 dataset for network intrusion detection", "urls": [ "https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.txt" ], "category": "intrusion", "samples": 125973, "features": [ "duration", "protocol_type", "service", "flag", "src_bytes", "dst_bytes", "land", "wrong_fragment", "urgent", "hot", "num_failed_logins", "logged_in", "num_compromised", "attack_type" ], "target": "attack_type", "format": "txt", "downloaded_at": "2026-01-29T16:35:02.373654", "status": "available" }, "unsw_nb15": { "name": "UNSW-NB15 Network Dataset", "description": "Modern network intrusion dataset with 9 attack types", "urls": [ "https://raw.githubusercontent.com/jmnwong/UNSW-NB15/master/UNSW-NB15_1.csv" ], "category": "intrusion", "samples": 175000, "features": [ "srcip", "sport", "dstip", "dsport", "proto", "state", "dur", "sbytes", "dbytes", "sttl", "dttl", "attack_cat", "label" ], "target": "label", "format": "csv", "downloaded_at": "2026-01-29T16:35:02.792570", "status": "available" }, "ipsum_malicious_ips": { "name": "IPsum Malicious IPs", "description": "Daily updated list of malicious IP addresses", "urls": [ "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt" ], "category": "threat_intel", "samples": 25000, "features": [ "ip_address", "threat_level" ], "target": "threat_level", "format": "txt", "downloaded_at": "2026-01-29T16:35:03.526227", "status": "available" }, "feodotracker_botnet": { "name": "Feodo Tracker Botnet C2", "description": "Botnet Command & Control server IPs", "urls": [ "https://feodotracker.abuse.ch/downloads/ipblocklist.csv" ], "category": "threat_intel", "samples": 5000, "features": [ "first_seen", "dst_ip", "dst_port", "malware", "status" ], "target": "malware", "format": "csv", "downloaded_at": "2026-01-29T16:35:03.907662", "status": "available" }, "urlhaus_malicious": { "name": "URLhaus Malicious URLs", "description": "Database of malware distribution URLs", "urls": [ "https://urlhaus.abuse.ch/downloads/csv_recent/" ], "category": "threat_intel", "samples": 10000, "features": [ "dateadded", "url", "url_status", "threat", "tags", "urlhaus_link" ], "target": "threat", "format": "csv", "downloaded_at": "2026-01-29T16:35:04.832782", "status": "available" }, "spambase_uci": { "name": "UCI Spambase", "description": "Email spam classification with word frequencies", "urls": [ "https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data" ], "category": "spam", "samples": 4601, "features": [ "word_freq_make", "word_freq_address", "word_freq_all", "char_freq_semicolon", "char_freq_dollar", "capital_run_avg", "capital_run_longest", "capital_run_total", "is_spam" ], "target": "is_spam", "format": "data", "downloaded_at": "2026-01-29T16:35:05.124845", "status": "available" }, "xss_payloads": { "name": "XSS Attack Payloads", "description": "Cross-site scripting attack patterns", "urls": [ "https://raw.githubusercontent.com/payloadbox/xss-payload-list/master/Intruder/xss-payload-list.txt" ], "category": "web_attack", "samples": 5000, "features": [ "payload", "type" ], "target": "type", "format": "txt", "downloaded_at": "2026-01-29T16:35:05.293648", "status": "available" }, "sql_injection_payloads": { "name": "SQL Injection Payloads", "description": "SQL injection attack patterns", "urls": [ "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Auth-Bypass.txt", "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Error-Based.txt" ], "category": "web_attack", "samples": 3000, "features": [ "payload", "injection_type" ], "target": "injection_type", "format": "txt", "downloaded_at": "2026-01-29T16:35:05.501629", "status": "available" }, "http_csic_requests": { "name": "HTTP CSIC 2010 Dataset", "description": "HTTP requests with web attacks (XSS, SQLi, etc.)", "urls": [ "https://raw.githubusercontent.com/Morzeux/HttpRequestsDataset/master/csic_http/csic_2010_cleaned.csv" ], "category": "web_attack", "samples": 36000, "features": [ "method", "url", "protocol", "content", "is_attack" ], "target": "is_attack", "format": "csv", "downloaded_at": "2026-01-29T16:35:05.724490", "status": "available" }, "cryptomining_scripts": { "name": "Cryptomining Script Detection", "description": "JavaScript cryptomining patterns", "urls": [ "https://raw.githubusercontent.com/ArslanKhan-cs/JSMiner/main/data/cryptominer.csv" ], "category": "cryptomining", "samples": 5000, "features": [ "script_hash", "obfuscated", "api_calls", "is_miner" ], "target": "is_miner", "format": "csv", "downloaded_at": "2026-01-29T16:35:05.924379", "status": "available" }, "dga_domains": { "name": "DGA Domain Detection", "description": "Domain Generation Algorithm detection dataset", "urls": [ "https://raw.githubusercontent.com/baderj/domain_generation_algorithms/master/dga_db/export/dga_domains_sample.csv" ], "category": "dns", "samples": 50000, "features": [ "domain", "family", "length", "entropy", "consonant_ratio", "is_dga" ], "target": "is_dga", "format": "csv", "downloaded_at": "2026-01-29T16:35:06.692993", "status": "available" }, "ssl_certificates": { "name": "SSL Certificate Analysis", "description": "SSL certificate features for malicious detection", "urls": [ "https://raw.githubusercontent.com/JustinGuese/ML-Security-SSL-Phishing/master/data/SSL-phishing.csv" ], "category": "ssl", "samples": 8000, "features": [ "cert_issuer", "cert_validity", "domain_match", "is_ev", "cipher_strength", "is_phishing" ], "target": "is_phishing", "format": "csv", "downloaded_at": "2026-01-29T16:35:06.841582", "status": "available" }, "system_logs_hdfs": { "name": "HDFS System Logs", "description": "Hadoop system logs for anomaly detection", "urls": [ "https://raw.githubusercontent.com/logpai/loghub/master/HDFS/HDFS.log_structured.csv" ], "category": "logs", "samples": 11000, "features": [ "timestamp", "level", "component", "content", "event_template" ], "target": "level", "format": "csv", "downloaded_at": "2026-01-29T16:35:07.926689", "status": "available" } }