|
|
--- |
|
|
license: mit |
|
|
task_categories: |
|
|
- text-classification |
|
|
language: |
|
|
- en |
|
|
pretty_name: sunny thakur |
|
|
size_categories: |
|
|
- n<1K |
|
|
--- |
|
|
# Malicious File Trick Detection Dataset |
|
|
|
|
|
This dataset provides a structured collection of **file-based social engineering and obfuscation techniques** used by attackers to bypass user awareness, antivirus (AV) detection, and security filters. Each entry identifies a malicious or deceptive filename, the evasion technique used, and detection methodology. |
|
|
|
|
|
The dataset is ideal for: |
|
|
- ๐ง Training AI/ML models for malware detection |
|
|
- ๐จ Building secure email gateways and filters |
|
|
- ๐ Teaching social engineering and malware delivery tactics |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐ Dataset Format |
|
|
|
|
|
Stored in `.jsonl` format (JSON Lines), with one structured object per line. |
|
|
|
|
|
### Fields |
|
|
|
|
|
| Field | Description | |
|
|
|---------------|-----------------------------------------------------------------------------| |
|
|
| `filename` | Example of a malicious or deceptive file name | |
|
|
| `technique` | Obfuscation method used (e.g., `Double extension`, `Unicode trick`) | |
|
|
| `category` | Context or delivery type (e.g., `Social Engineering`, `Malware Delivery`) | |
|
|
| `detected_by` | Detection method or defense mechanism (e.g., `AV heuristic`, `Sandbox`) | |
|
|
|
|
|
--- |
|
|
|
|
|
## ๐ Example |
|
|
|
|
|
```json |
|
|
{ |
|
|
"filename": "report.pdf.exe", |
|
|
"technique": "Double extension", |
|
|
"category": "Social Engineering", |
|
|
"detected_by": "AV heuristic" |
|
|
} |
|
|
โ
Key Techniques Included |
|
|
|
|
|
Double extension (file.pdf.exe) |
|
|
|
|
|
Whitespace padding (file.txt .exe) |
|
|
|
|
|
Unicode manipulation (fileโฎ.exe) |
|
|
|
|
|
Alternate file data streams (Windows ADS) |
|
|
|
|
|
Executable macros in Office docs (.docm, .xlsm) |
|
|
|
|
|
Archive deception (.zip bombs, nested .rar) |
|
|
|
|
|
Script obfuscation (.vbs, .bat, .js payloads) |
|
|
|
|
|
๐ Use Cases |
|
|
|
|
|
Machine learning for secure email filtering |
|
|
|
|
|
Static or behavioral malware classifiers |
|
|
|
|
|
LLM training for phishing/malware awareness |
|
|
|
|
|
Threat modeling and red team education |
|
|
|
|
|
โ ๏ธ Disclaimer |
|
|
|
|
|
This dataset is for educational, research, and defense purposes only. Do not use these payloads in unauthorized environments. The author is not responsible for misuse. |
|
|
๐ License |
|
|
|
|
|
This dataset is released under the MIT License. You are free to use, modify, and redistribute with attribution. |
|
|
๐ค Contributions |
|
|
|
|
|
Want to add more techniques or filenames? PRs are welcome! |
|
|
๐ซ Maintainer |
|
|
|
|
|
Your Name |
|
|
GitHub: @sunnythakur25 |
|
|
Email: sunny48445@gmail.com |