File size: 2,558 Bytes
51e9435
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
---
license: mit
task_categories:
- text-classification
language:
- en
pretty_name: sunny thakur
size_categories:
- n<1K
---
# Malicious File Trick Detection Dataset

This dataset provides a structured collection of **file-based social engineering and obfuscation techniques** used by attackers to bypass user awareness, antivirus (AV) detection, and security filters. Each entry identifies a malicious or deceptive filename, the evasion technique used, and detection methodology.

The dataset is ideal for:
- 🧠 Training AI/ML models for malware detection
- 🚨 Building secure email gateways and filters
- 📚 Teaching social engineering and malware delivery tactics

---

## 📁 Dataset Format

Stored in `.jsonl` format (JSON Lines), with one structured object per line.

### Fields

| Field         | Description                                                                 |
|---------------|-----------------------------------------------------------------------------|
| `filename`    | Example of a malicious or deceptive file name                               |
| `technique`   | Obfuscation method used (e.g., `Double extension`, `Unicode trick`)         |
| `category`    | Context or delivery type (e.g., `Social Engineering`, `Malware Delivery`)   |
| `detected_by` | Detection method or defense mechanism (e.g., `AV heuristic`, `Sandbox`)     |

---

## 🔍 Example

```json
{
  "filename": "report.pdf.exe",
  "technique": "Double extension",
  "category": "Social Engineering",
  "detected_by": "AV heuristic"
}
✅ Key Techniques Included

    Double extension (file.pdf.exe)

    Whitespace padding (file.txt .exe)

    Unicode manipulation (file‮.exe)

    Alternate file data streams (Windows ADS)

    Executable macros in Office docs (.docm, .xlsm)

    Archive deception (.zip bombs, nested .rar)

    Script obfuscation (.vbs, .bat, .js payloads)

🛠 Use Cases

    Machine learning for secure email filtering

    Static or behavioral malware classifiers

    LLM training for phishing/malware awareness

    Threat modeling and red team education

⚠️ Disclaimer

This dataset is for educational, research, and defense purposes only. Do not use these payloads in unauthorized environments. The author is not responsible for misuse.
📜 License

This dataset is released under the MIT License. You are free to use, modify, and redistribute with attribution.
🤝 Contributions

Want to add more techniques or filenames? PRs are welcome!
📫 Maintainer

Your Name
GitHub: @sunnythakur25
Email: sunny48445@gmail.com