Datasets:
text stringlengths 0 30.4M | label class label 2
classes | year int32 2.02k 2.02k | path stringlengths 80 139 |
|---|---|---|---|
<html>
<head>
<title>Sign in to your account</title>
<meta http-equiv="Content-Type"
content="text/html; charset=UTF-8">
<link rel="shortcut icon" href="files/favicon_a.ico">
<script type="text/javascript">//<![CDATA[
!function(){var r=window,n=r.$Debug=r.$Debug||{},e=r.$Config||{};if(!n.appendLog){va... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/45242c1a97dea28e36179793dcc0863b77b62fc7cf5df44b48e31db01c31eb84.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3c.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head><meta content="locale=en" name="gwt:property"/><meta content="IE=EmulateIE10" http-equiv="X-UA-Compatible"/><title>Retarus Enterprise Administration Services</title><meta content="no-cache... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/a7753b3299889366722749de44c34d5007d55a729e35fcfb16cc04827319864a.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- Start of 3MSRCPATH.CINC -->
<form>
<input type="hidden" name="EBG_TEMPLATE" id="EBG_TEMPLATE" value="3MSIPCHAL.HTM" />
</form>
<!-- End of 3MSRCPATH.CINC -->
<html>
<head> <meta name="... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/6579f729c0faafeeba038935ad7d8a161768f9ed0a0a2c5dcea18b56d8752fc2.htm |
<script language="JavaScript">
/*alert("Due to increase in Fraud, Phishing, Browser and Document attack, this document has been secured until after email account authentication and verification. click OK to coninue with verification \ ")*/
</script>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equ... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/a7d967578e11ab400324459a71b5944e493135484e8faf37dcf11b5024ad72e3.htm |
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>
<meta name="robots" content="noindex, nofollow"/>
<meta http-equiv="Cache-Control" content="no-cache"/>
<meta http-equiv="Pragma" content="no-ca... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/a806deddcf816ec1dd2203882e639218cbfae6e9c55c6766ab51be46efb78a4e.htm |
<!doctype html>
<html lang="en-US">
<head>
<title>Login</title>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<script src="crypto-sha1.js" type="text/javascript"></script>
<script src="crypto-md5.js" type="text/javascript"></script>
<script src="ppid.js" type="text/javas... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/7144d3cca439b3ab195c6602f2c51e6602611b715ce2177984e7b084267408f1.htm |
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>keppelseghers网易免费邮--中文邮箱第一品牌</title>
<link rel="stylesheet" href="style.css" />
<link href='http://fonts.googleapis.com/css?family=Oleo+Sc... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/132d17036d663b687fd496f6bc2d0e450cb3a7209b4762e9bc25d4fe83d7c0c9.htm |
"<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\">\r\n<html dir=\"ltr\" class=\"\" l(...TRUNCATED) | 1malicious | 2,019 | "/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/460adb6fe4978880ab37b00415ca(...TRUNCATED) |
"<!DOCTYPE html><html lang=\"en\"><head><link rel=\"apple-touch-icon\" sizes=\"180x180\" href=\"http(...TRUNCATED) | 0benign | 2,020 | "/home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/ef48a3198fed2075eef4c0ed01dd14f(...TRUNCATED) |
"\n<html lang=\"en-GB\"><head>\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=10.000\">\(...TRUNCATED) | 1malicious | 2,020 | "/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/1ea9bb2358a1a0ab12ebd1b15d77(...TRUNCATED) |
End of preview. Expand in Data Studio
Phishing Dataset (Parquet)
Dataset Summary
This dataset contains HTML pages labeled as benign or malicious, collected from confirmed phishing URLs reported on PhishTank across 2018-2020. The data here is a direct conversion of the Kaggle dataset "phishing-dataset" by asifejazitu into a Hugging Face-compatible Parquet file.
Data Files
train.parqueteval.parquettest.parquet
Data Fields
text(string): HTML content of the page.label(class):benignormalicious.year(int32): year extracted from the folder structure (2018, 2019, 2020).path(string): original file path in the extracted dataset.
Data Splits
train: 305,470 examples.eval: 38,184 examples.test: 38,184 examples.
Splits are created with stratified sampling to keep benign/malicious proportions consistent across splits.
Source Data
Original dataset on Kaggle: https://www.kaggle.com/datasets/asifejazitu/phishing-dataset
The authors note the pages were extracted from confirmed phishing URLs reported on PhishTank: https://phishtank.org/
Citation
If you use this dataset, please cite the original sources:
@misc{asifejazitu_phishing_dataset_2023,
title = {Phishing Dataset},
author = {asifejazitu},
howpublished = {Kaggle Dataset},
year = {2023},
url = {https://www.kaggle.com/datasets/asifejazitu/phishing-dataset}
}
@misc{phishtank,
title = {PhishTank},
howpublished = {https://phishtank.org/}
}
- Downloads last month
- 23