mikosovsky's picture
Update README.md
ace259d verified
---
license: mit
task_categories:
- text-classification
tags:
- malware
- code
- decompiled
pretty_name: malware dataset code and decompiled C pseudocode
size_categories:
- n<1K
---
# Malware Source Code and Decompiled C Pseudocode Dataset
## Overview
This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**.
The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**.
## Data Origin
The data is based on the following archive:
- **VXUnderground Archive**
- **Old APT Collection**
- **Archive version:** `2024.7z`
VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns.
## Decompilation Scope and Limitations
⚠️ **Important Notice**
Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled.
- Only a **subset of executable malware samples** was processed
- Decompilation was performed using **Ghidra in headless mode**
- Some binaries may be missing corresponding decompiled outputs
- The dataset should **not** be considered complete or exhaustive
This selective decompilation approach was chosen to balance dataset size with practical feasibility.
## Repository Structure
```
.
├── code/
│ └── * (malware source code files without file extensions)
├── decompiled/
│ └── *.decomp.c (C-like pseudocode generated by Ghidra)
└── README.md
```
### `code/`
- Contains **original malware source code**
- **All files have no file extensions**
- Files originate directly from the VXUnderground archive
- Code may be incomplete, obfuscated, or inconsistent in formatting
### `decompiled/`
- Contains **C-like pseudocode** produced by **Ghidra**
- **All files use the `.decomp.c` extension**
- Represents decompiled versions of selected executable malware samples
- Output reflects:
- Ghidra’s internal analysis
- Heuristics and limitations of automated decompilation
- The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler
## Intended Use Cases
This dataset can be used for:
- Malware classification (malware vs benign)
- Program comprehension and reverse engineering research
- Training and evaluation of:
- Large Language Models (LLMs)
- Recursive Language Models (RLMs)
- Static analysis pipelines
- Malware family analysis and feature extraction
- Source code ↔ pseudocode alignment tasks
## Disclaimer
⚠️ **Warning**
- This repository contains **real malware code**
- The code is provided **strictly for research and educational purposes**
- **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM)
- The authors take **no responsibility** for misuse or damage caused by this dataset
## License and Attribution
- Original malware samples are attributed to **VXUnderground**
- Ghidra is developed and maintained by the **National Security Agency (NSA)**
- This dataset is a **derived work** created for research purposes only
If you use this dataset in academic work, please cite:
- VXUnderground as the original data source
- Ghidra as the decompilation tool
## Contact
For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer.