bb1nfosec commited on
Commit
6a13e81
·
verified ·
1 Parent(s): f92cf7f

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +8 -102
README.md CHANGED
@@ -13,130 +13,36 @@ This dataset card aims to be a base template for owasp web attacks. It has been
13
 
14
  ### Dataset Description
15
 
16
- <!-- Provide a longer summary of what this dataset is. -->
17
 
18
 
19
-
20
- - **Curated by:** [More Information Needed]
21
- - **Funded by [optional]:** [More Information Needed]
22
- - **Shared by [optional]:** [More Information Needed]
23
- - **Language(s) (NLP):** [More Information Needed]
24
  - **License:** GNU
25
 
26
  ### Dataset Sources [optional]
27
 
28
  <!-- Provide the basic links for the dataset. -->
29
 
30
- - **Repository:** [More Information Needed]
31
- - **Paper [optional]:** [More Information Needed]
32
- - **Demo [optional]:** [More Information Needed]
33
-
34
  ## Uses
35
-
36
- <!-- Address questions around how the dataset is intended to be used. -->
37
 
38
  ### Direct Use
39
 
40
- <!-- This section describes suitable use cases for the dataset. -->
41
-
42
  [More Information Needed]
43
 
44
  ### Out-of-Scope Use
45
 
46
- <!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
47
 
48
  [More Information Needed]
49
 
50
  ## Dataset Structure
51
 
52
- <!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
53
-
54
- [More Information Needed]
55
-
56
- ## Dataset Creation
57
-
58
- ### Curation Rationale
59
-
60
- <!-- Motivation for the creation of this dataset. -->
61
-
62
- [More Information Needed]
63
-
64
- ### Source Data
65
-
66
- <!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
67
-
68
- #### Data Collection and Processing
69
-
70
- <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
71
 
72
- [More Information Needed]
73
-
74
- #### Who are the source data producers?
75
-
76
- <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
77
-
78
- [More Information Needed]
79
-
80
- ### Annotations [optional]
81
-
82
- <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
83
-
84
- #### Annotation process
85
-
86
- <!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
87
-
88
- [More Information Needed]
89
-
90
- #### Who are the annotators?
91
-
92
- <!-- This section describes the people or systems who created the annotations. -->
93
-
94
- [More Information Needed]
95
-
96
- #### Personal and Sensitive Information
97
-
98
- <!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
99
-
100
- [More Information Needed]
101
-
102
- ## Bias, Risks, and Limitations
103
-
104
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
105
-
106
- [More Information Needed]
107
-
108
- ### Recommendations
109
-
110
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
111
-
112
- Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
113
-
114
- ## Citation [optional]
115
-
116
- <!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
117
-
118
- **BibTeX:**
119
-
120
- [More Information Needed]
121
-
122
- **APA:**
123
-
124
- [More Information Needed]
125
-
126
- ## Glossary [optional]
127
-
128
- <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
129
-
130
- [More Information Needed]
131
-
132
- ## More Information [optional]
133
-
134
- [More Information Needed]
135
 
136
  ## Dataset Card Authors [optional]
137
 
138
- [More Information Needed]
139
-
140
- ## Dataset Card Contact
141
-
142
- [More Information Needed]
 
13
 
14
  ### Dataset Description
15
 
16
+ This dataset was generated using commonly available payloads, Its generated using intruder of burpsuite and tried against vulnerable site publicly available data.
17
 
18
 
19
+ - **Curated by:** vignesh,Nagendran
 
 
 
 
20
  - **License:** GNU
21
 
22
  ### Dataset Sources [optional]
23
 
24
  <!-- Provide the basic links for the dataset. -->
25
 
26
+ - **Repository:** https://github.com/swisskyrepo/PayloadsAllTheThings
27
+ -
 
 
28
  ## Uses
29
+ Incase of future owasp based automations and trainings.
 
30
 
31
  ### Direct Use
32
 
33
+ Web Application pentest
 
34
  [More Information Needed]
35
 
36
  ### Out-of-Scope Use
37
 
 
38
 
39
  [More Information Needed]
40
 
41
  ## Dataset Structure
42
 
43
+ Its pure intruder traffic, We have just fuzzed with commonly available payloads and created this dataset
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
44
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
45
 
46
  ## Dataset Card Authors [optional]
47
 
48
+ Vignesh,Nagendran GS