CyberSecurity-1M / README.md
morinoppp's picture
Update citation author to WhitzardAgent Team (SIIxFudan)
d8b75cf verified
---
language:
- en
- zh
license: apache-2.0
extra_gated_prompt: >-
This dataset is provided strictly for academic, non-commercial research
purposes only. It contains cybersecurity content including vulnerability
details, exploit techniques, and offensive security information. By
requesting access, you confirm that you will use this dataset solely for
lawful academic research, education, or defensive security purposes, and
will not use it for any commercial or illegal activities. Access requests
using personal email addresses (Gmail, Outlook, QQ, etc.) will be
rejected — please use your institutional/organizational email.
extra_gated_fields:
Full Name: text
Institution/Organization: text
Country: country
Institutional Email: text
Intended Use: text
I confirm that I will use this dataset solely for academic, non-commercial research or education purposes, and I will not redistribute, sell, or use it for any unlawful activities: checkbox
extra_gated_heading: Access Request (Academic Use Only)
extra_gated_description: >-
This dataset is available exclusively for academic and non-commercial
research. Please provide your institutional email and affiliation below.
Requests from non-institutional email addresses will not be approved.
Review typically takes 1-2 business days.
extra_gated_button_content: Request Access
license_details: >-
The dataset compilation is released under Apache 2.0 for academic,
non-commercial use. Individual content items retain their original
source licensing. Users must verify licensing terms before redistributing
any specific content. Commercial use is prohibited without explicit
authorization.
annotations_creators:
- machine-generated
language_creators:
- machine-generated
pretty_name: CyberSecurity-1M
tags:
- cybersecurity
- vulnerability-research
- threat-intelligence
- incident-response
- security
- forensics
- ai-security
task_categories:
- text-generation
- summarization
- question-answering
- text-classification
task_ids:
- language-modeling
- news-articles-summarization
- open-domain-qa
- topic-classification
source_datasets:
- original
size_categories:
- 1M<n<10M
configs:
- config_name: vulnerability
data_files:
- split: train
path: merged/vulnerability.jsonl
- config_name: ctf
data_files:
- split: train
path: merged/ctf.jsonl
- config_name: framework
data_files:
- split: train
path: merged/framework.jsonl
- config_name: reference
data_files:
- split: train
path: merged/reference.jsonl
- config_name: cn_sec
data_files:
- split: train
path: merged/cn_sec.jsonl
- config_name: books
data_files:
- split: train
path: merged/books.jsonl
- config_name: threat_intel
data_files:
- split: train
path: merged/threat_intel.jsonl
- config_name: tool
data_files:
- split: train
path: merged/tool.jsonl
- config_name: offsec
data_files:
- split: train
path: merged/offsec.jsonl
- config_name: incident_response
data_files:
- split: train
path: merged/incident_response.jsonl
- config_name: vuln_research
data_files:
- split: train
path: merged/vuln_research.jsonl
- config_name: news
data_files:
- split: train
path: merged/news.jsonl
- config_name: ics_ot
data_files:
- split: train
path: merged/ics_ot.jsonl
- config_name: conference
data_files:
- split: train
path: merged/conference.jsonl
- config_name: bug_bounty
data_files:
- split: train
path: merged/bug_bounty.jsonl
- config_name: ai_security
data_files:
- split: train
path: merged/ai_security.jsonl
dataset_info:
features:
- name: id
dtype: string
- name: title
dtype: string
- name: source
dtype: string
- name: _original_source
dtype: string
- name: url
dtype: string
- name: category
dtype: string
- name: cve
dtype: string
- name: author
dtype: string
- name: date
dtype: string
- name: tags
sequence: string
- name: description
dtype: string
- name: markdown
dtype: string
- name: exploit_code
dtype: string
- name: bounty
dtype: string
- name: extra
struct:
- name: feed_url
dtype: string
- name: scraped_at
dtype: string
- name: schema_version
dtype: int32
---
# CyberSecurity-1M
A large-scale, multi-source cybersecurity knowledge dataset containing **1.1M+ records** across **16 categories**, collected exclusively for **academic, non-commercial research** purposes.
> **Disclaimer:** This dataset is provided for academic research only. All content is aggregated from publicly available sources. The views, opinions, and information expressed in the dataset content do not represent the views or positions of the research team. The research team does not endorse, support, or take responsibility for any of the content. Users access and use this dataset at their own risk.
> **Security Notice:** This dataset contains information about cybersecurity vulnerabilities, exploitation techniques, and offensive security methods. This information is already publicly available and is collected here solely for defensive security research and education. Misuse of this information to attack systems without authorization is illegal. Users must comply with all applicable laws and regulations.
## Dataset Description
- **Curated by:** [morinoppp](https://huggingface.co/morinoppp)
- **License:** Apache 2.0 — **academic, non-commercial use only**
- **Languages:** English (primary), Chinese (secondary)
- **Size:** ~9.1GB, 1.11M+ records
- **Format:** JSON Lines (JSONL)
### Dataset Summary
CyberSecurity-1M aggregates publicly available cybersecurity content from diverse sources into a unified, categorized, and quality-annotated dataset. It is designed to support cybersecurity research, LLM fine-tuning for security domains, threat intelligence analysis, and security education.
The dataset covers the full spectrum of cybersecurity knowledge:
- **Vulnerability databases** (CVE records, security advisories)
- **Threat intelligence** (APT reports, malware analysis, IOCs)
- **Offensive security** (penetration testing, red teaming)
- **Defensive security** (incident response, detection rules, forensics)
- **Security frameworks** (attack frameworks, detection rulesets)
- **CTF & training** (CTF writeups, exercises, tutorials)
- **Security tools** (templates, modules, exploit code)
- **Reference materials** (cheat sheets, documentation, curated lists)
- **Chinese-language security community** content
- **Books & conference talks** (OCR-extracted PDFs, presentation transcripts)
### Supported Tasks
- **Language modeling / text generation:** Pre-train or fine-tune LLMs on cybersecurity domain text
- **Summarization:** Generate summaries of threat reports, vulnerability advisories
- **Question answering:** Build cybersecurity QA systems over the knowledge base
- **Text classification:** Categorize security content by type, severity, or topic
- **Information extraction:** Extract IOCs, CVEs, TTPs from unstructured text
- **Retrieval-augmented generation (RAG):** Use as a knowledge base for security-focused systems
## Dataset Structure
```
CyberSecurity-1M/
├── merged/ # Categorized & merged data (16 categories)
│ ├── vulnerability.jsonl # ~876K records
│ ├── ctf.jsonl # ~74K records
│ ├── cn_sec.jsonl # ~50K records
│ ├── reference.jsonl # ~48K records
│ ├── tool.jsonl # ~17K records
│ ├── incident_response.jsonl # ~13K records
│ ├── framework.jsonl # ~7.8K records
│ ├── bug_bounty.jsonl # ~6.4K records
│ ├── threat_intel.jsonl # ~5.1K records
│ ├── offsec.jsonl # ~4.9K records
│ ├── books.jsonl # ~3.3K records
│ ├── vuln_research.jsonl # ~1.8K records
│ ├── news.jsonl # ~846 records
│ ├── ics_ot.jsonl # ~767 records
│ ├── conference.jsonl # ~353 records
│ └── ai_security.jsonl # ~207 records
└── source_registry.json # Inventory of all sources with quality status
```
### Data Instances
Each JSONL record follows the `CyberRecord` schema:
```json
{
"id": "a1b2c3d4e5f6",
"title": "CVE-2024-1234: Remote Code Execution in Framework X",
"source": "vuln_db",
"_original_source": "vuln_db",
"url": "https://example.com/advisory/CVE-2024-1234",
"category": "vulnerability",
"cve": "CVE-2024-1234",
"author": null,
"date": "2024-03-15",
"tags": ["rce", "critical"],
"description": "A remote code execution vulnerability exists in...",
"markdown": "# CVE-2024-1234\n\n## Description\nA remote code execution vulnerability...",
"exploit_code": null,
"bounty": null,
"extra": {},
"scraped_at": "2026-05-08T12:00:00+00:00",
"schema_version": 1
}
```
### Data Fields
| Field | Type | Description |
|-------|------|-------------|
| `id` | string | Unique record identifier |
| `title` | string | Record title |
| `source` | string | Source identifier |
| `_original_source` | string | Same as source; preserved for provenance after merging |
| `url` | string | Original URL of the content |
| `category` | string | Category name (one of 16 categories) |
| `cve` | string | CVE identifier, if applicable |
| `author` | string | Author name(s) |
| `date` | string | Publication date |
| `tags` | list[string] | Content tags/topics |
| `description` | string | Brief description/summary |
| `markdown` | string | Full text content in markdown format |
| `exploit_code` | string | Source code / payload content (for tool sources) |
| `bounty` | string | Bug bounty amount (for bug_bounty category) |
| `extra` | object | Source-specific metadata |
| `scraped_at` | string | ISO 8601 timestamp of when the record was collected |
| `schema_version` | int | Schema version (currently 1) |
### Data Splits
This dataset uses a single `train` split. Records are organized into 16 category-based configurations (see `configs` in YAML metadata). Each configuration can be loaded independently:
```python
from datasets import load_dataset
# Load a specific category
ds = load_dataset("morinoppp/CyberSecurity-1M", "vulnerability", split="train")
# Load all categories
ds = load_dataset("morinoppp/CyberSecurity-1M", split="train")
```
## Category Overview
| Category | Records | Size | Description |
|----------|---------|------|-------------|
| vulnerability | ~876K | 3.1GB | CVE records, security advisories |
| ctf | ~74K | 1.9GB | CTF writeups and exercises |
| cn_sec | ~50K | 515MB | Chinese-language security content |
| reference | ~48K | 626MB | Documentation, cheat sheets, curated lists |
| tool | ~17K | 146MB | Security tools and templates |
| incident_response | ~13K | 64MB | Incident response and forensics |
| framework | ~7.8K | 1.2GB | Security frameworks and detection rulesets |
| bug_bounty | ~6.4K | 255MB | Bug bounty writeups |
| threat_intel | ~5.1K | 641MB | Threat research and APT reports |
| offsec | ~4.9K | 71MB | Offensive security and penetration testing |
| books | ~3.3K | 407MB | OCR-extracted cybersecurity books |
| vuln_research | ~1.8K | 80MB | Vulnerability research and analysis |
| news | ~846 | 68MB | Security news |
| ics_ot | ~767 | 35MB | ICS/OT/SCADA security |
| conference | ~353 | 0.2MB | Security conference presentations |
| ai_security | ~207 | 2.3MB | LLM/AI security research |
## Considerations
### Academic Use Only
This dataset is compiled and distributed **strictly for academic, non-commercial research purposes**. Any commercial use, redistribution for profit, or application in commercial products is strictly prohibited without explicit written authorization. The research team receives no financial benefit from this dataset.
### Disclaimer
The content in this dataset is aggregated from publicly available sources and represents the views of the original authors, **not** the research team. The research team:
- Does **not** endorse, verify, or guarantee the accuracy of any content
- Does **not** take responsibility for any claims, opinions, or information in the dataset
- Does **not** encourage or support the use of this information for unauthorized access or illegal activities
- Makes no warranties, express or implied, regarding the dataset's fitness for any particular purpose
### Security Risk Notice
This dataset contains technical information about vulnerabilities, exploitation methods, and offensive security techniques. While this information is already publicly available, users should be aware that:
- **Unauthorized use** of exploit techniques against systems you do not own or have explicit permission to test is **illegal** in most jurisdictions
- **Responsible disclosure** practices should be followed when discovering new vulnerabilities
- Users must comply with all applicable **local, national, and international laws**
- The dataset should only be used to **improve defensive security** capabilities
### Licensing
The dataset compilation is released under Apache 2.0 for academic, non-commercial use. Individual content items retain their original source licensing. Some content may have specific terms of service or attribution requirements — users must verify licensing for specific content before any redistribution. Commercial use is prohibited.
### Biases
- **Language bias:** English content dominates (~80%), with Chinese as secondary (~18%)
- **Source bias:** Content reflects the perspectives and coverage of the original sources
- **Recency bias:** Content is more complete for recent years
- **Category imbalance:** Vulnerability data (~876K) vastly outnumbers other categories
## Citation
```bibtex
@dataset{cybersecurity-1m,
title={CyberSecurity-1M: A Large-Scale Multi-Source Cybersecurity Knowledge Dataset},
author={WhitzardAgent Team (SIIxFudan)},
year={2026},
publisher={Hugging Face},
url={https://huggingface.co/datasets/morinoppp/CyberSecurity-1M}
}
```