This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthetic traffic and network attacks ... The 2009 DARPA dataset is a synthesized dataset created to simulate real Internet traffic and network attacks. ...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2011 NC Cyber Defense Competition ... These log files are packet captures from the 2011 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2012 NC Cyber Defense Competition ... These log files are packet captures from the 2012 National Collegiate Cyber Defense Competition (nccdc,org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Medical device network traffic collected from a Philips Healthcare Supplied Network (PSN). The data collection system consisted of a Fluke ProSim 8 patient ...
Normal operation data was collected from a network of computers running OpenICE software. Medical devices included: one each to a Puritan-Bennet 840 ventilat...
Normal operation data was collected from a network of computers running OpenICE software. One MacOS computer was running an OpenICE supervisor with four Beag...
This dataset represents the traffic emitted during the setup of 31 smart home IoT devices of 27 different types. Each setup was repeated at least 20 times pe...
The goal of this project is to characterize internal enterprise traffic recorded at a medium-sized site, and to determine ways in which modern enterprise tra...
A dataset of DNS traffic data collected during 10 separate days. ... Campus DNS network traffic consisting of more than 4000 active users (in peak load hours...
The data sets contain traffic in and out of the web server of the Student Union for Electrical Engineering (Fachbereichsvertretung Elektrotechnik) at Ulm Uni...
Acra is a database security suite for data-driven apps: database proxy with strong selective encryption, search through encrypted data, SQL injections preven...
In order to facilitate research around DNS, this project actively submits iterative and recursive DNS lookups for the several popular zones (i.e., COM, NAME,...
ADFA IDS is an intrusion detection system dataset made publicly available in 2013, intended as representative of modern attack structure and methodology to r...
This collection contains labeled network traffic data in ARFF format. The original purpose was to train ransomware detection in the Aktaion IDS. ... Data was...
A set of daily Alexa Top Million Scans to collect session tickets over a 9-week period. ... These scans were collected from 03Mar2016 to 04May2016 for the pu...
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !) ... Androguard is a full python tool to play with Android f...
Android Adware and General Malware Dataset ... The AAGM dataset is captured by installing the Android apps on the real smartphones semi-automated. The datase...
This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families. ......
A dataset containing both normal and malware infected android applications. ... This dataset contains 18,850 normal android application packages and 10,000 m...
We collected more than 10,854 samples (4,354 malware and 6,500 benign) from several sources. We have collected over six thousand benign apps from Googleplay ...
AMD contains 24,553 samples, categorized in 135 varieties among 71 malware families ranging from 2010 to 2016. ... The dataset provides an up-to-date picture...
In this project, we focus on the Android platform and aim to systematize or characterize existing Android malware. ... This project has managed to collect mo...
The Android PRAGuard Dataset is a collection of obfuscated malware from Android devices. ... The dataset contains 10479 samples, obtained by obfuscating the ...
A system to built to find the relations between the app on androids. ... This data set wich consist in 72 original apps from different origins, and the follo...
AndroZoo is a growing collection of Android Applications collected from several sources, including the official Google Play app market. ... The dataset curre...
This project developed a systematic approach to generate diverse and comprehensive benchmark datasets for intrusion detection resulting in a dataset containi...
This is a corpus of auto-labeled cyber security domain text which was used for automatically extracting security-related entities using machine learning. Thi...
Graph of Autonomous Systems (AS). Each AS exchanges traffic flows with some neighbors (peers). We construct a communication network of who-talks-to- whom fro...
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs. ... Supported data sources for Beagle include ...
The datasets consist of two sets of raw mouse dynamics data for 22 and 26 different human users collected in 2003 and 2007, respectively; this represents in ...
This dataset is a who-trusts-whom network of people who trade using Bitcoin on a platform called Bitcoin OTC. Since Bitcoin users are anonymous, there is a n...
BoNeSi, the DDoS Botnet Simulator, is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS atta...
Bot network feed contains a log of our reports and status of the issue reported. ... This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Ins...
Assessing performance of any detection approach requires experimentation with data that is heterogeneous enough to simulate real traffic to an acceptable lev...
A Labeled Dataset with Botnet, Normal and Background traffic ... The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Rep...
BriarIDS is an All-In-One home intrusion detection system (IDS) solution for the Raspberry PI. ... A simple yet effective IDS for the Raspberry PI. BriarIDS ...
Multiple password cracking dictionaries separated based on purpose. ... Dictionaries included in the dataset: 8-more-passwords.txt sorting only passwords wi...
Dataset used for creating a DGA (Domain Generating Algorithm) classifier, a deterministic generator of random (hard to guess) domains, of which the bot maint...
Wifi scan results and connection status collected using the PhoneLab smartphone testbed. ... Smartphones perform Wifi scans to adapt to the changing wireless...
Dataset of UDP and TCP transfers between a moving car and an 802.11b access point. ... Dataset of UDP and TCP transfers between a car traveling at speeds fro...
Pcaps from National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition ... The U.S. National CyberWatch Mid-Atlantic Collegiate Cyber Defense Compe...
The captured file feed contains new files recently discovered by our system. This is currently delayed publicly by 30 days. ... Captured file feed contains a...
DoS attacks dataset ... In this study the focus was on the universal type of application DoS slow-rate attacks that are often seen in two variations: slow se...
Complete Mandiant Offensive VM (Commando VM), the first full Windows-based penetration testing virtual machine distribution. ... Born from our popular FLARE ...
This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory's corporate, inter...
Conpot is an ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems ... ConpotF...
16,800 clean and 11,960 malicious files for signature testing and research. ... Contagio is a collection of the latest malware samples, threats, observations...
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also f...
A dictionary containing every wordlist, dictionary, and password database leak publicly accessible on the internet ... The format of the list is a standard t...
The datasets contains transactions made by credit cards in September 2013 by european cardholders. This dataset presents transactions that occurred in two da...
The Critical.IO project was designed to uncover large-scale vulnerabilities on the global IPv4 internet and scanned a number of ports across between May 2012...
This dataset is composed of a selection of Windows API/System-Call trace files, intended for testing on classifiers treating with sequences. ... Malware call...
Cyber Threat Intelligence Repository expressed in STIX 2.0 ... The Cyber Threat Intelligence Repository of ATT CK and CAPEC catalogs expressed in STIX 2.0 JS...
Cuckoo Sandbox is an automated dynamic malware analysis system ... Cuckoo Sandbox is the leading open sourceautomated malware analysis system. You can throw ...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber threat indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/ AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. ... The probe, cyberprobe has the foll...
The CyberVAN testbed provides a testing and experimentation environment to support cyber security research. ... CyberVAN provides the highest fidelity repres...
DreamMarket Dark Net Market is an online platform for exchanging illegal goods by cybercriminals. This dataset has information about products and sellers. .....
Darknet is an open source neural network framework written in C and CUDA. ... Darknet apply a single neural network to the full image. This network divides t...
Dawnscanner is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks. ... Dawnscann...
Two AWS honeypot data sets. One is a CSV file from a collection of AWS honeypots. The other is CSV file from a collection of AWS honeypots with both long int...
Data used in machine learning experiments to detect malicious URLs. ... The long-term goal of this research is to construct a real-time system that uses mach...
Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious...
A free, community-sourced, machine-readable knowledge base of digital forensic artifacts that the world can use both as an information source and within othe...
dnstwist is a domain name permutation engine for detecting typo squatting, phishing and corporate espionage. ... dnstwist takes in your domain name as a seed...
A malware/botnet analysis framework written in Ruby. ... Dorothy2 is a framework created for suspicious binary analysis. Its main strengths are a very flexib...
A framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general. ...
A labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files ... The ember dataset is a ...
Ether is a malware analysis framework which leverages hardware virtualization extensions (specifically Intel VT) to remain transparent to malicious software....
Expose is an Intrusion Detection System for PHP loosely based on the PHPIDS project (and using its ruleset for detecting potential threats). ... Expose allow...
This data set is from a Cyber Exercise conducted by the Software Engineering Institute at Carnegie Mellon University in June 2015. Network traffic was captur...
Automatically extract obfuscated strings from malware. ... Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heurist...
DNS 'ANY', 'A', 'AAAA', 'TXT' and 'CNAME' responses for known forward DNS names ... This dataset contains the responses to DNS requests for all forward DNS n...
DNS 'ANY' responses for known forward DNS names from 2014-2017 ... This dataset contains the responses to DNS 'ANY' requests for all forward DNS names known ...
This tool evaluates various methods for scheduling the fuzzing of program pairs. The key feature of the system is that comprehensive data on fuzzing all pair...
GEF - GDB Enhanced Features for exploit devs & reversers ... GEF is a set of commands for x86/64, ARM, MIPS, PowerPC and SPARC to assist exploit developers a...
A sequence of snapshots of the Gnutella peer-to-peer file sharing network from August 2002. ... There are total of 9 snapshots of Gnutella network collected ...
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute p...
Hale is a botnet command & control monitor/spy with a modular design to easily develop new modules that monitor new protocols used by C&C servers ... The mai...
Regular daily scans of IPv4 and the Alexa Top 1 Million domains on HTTPS and SMTP+StartTLS for the Heartbleed vulnerability. ... This dataset is composed of ...
The Honeynet Project goal is to improve Internet security by sharing lessons learned about the most common threats. The Honeynet project deploys honeynets al...
Honeytrap is an extensible and opensource system for running, monitoring and managing honeypots. ... Features of HoneyTrap: Combine multiple services to one...
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentia...
The HTTP dataset CSIC 2010 contains thousands of web requests automatically generated. It can be used for the testing of web attack protection systems. It wa...
Project Sonar includes regular HTTP/1.1 GET requests against various HTTP ports ... Ths dataset contains the responses to HTTP/1.1 GET requests performed aga...
eMews is a collection of PCAP data captured from an in-lab emulated network, using the CORE network emulator and the eMews framework developed to generate pa...
Regular and continuing scans of the HTTPS Ecosystem from 2012 and 2013 including parsed and raw X.509 certificates, temporal state of scanned hosts, and the ...
Project Sonar includes HTTPS GET requests for all IPv4 hosts with open HTTPS ports ... This study performs an HTTP/1.1 GET after establishing an SSL/TLS conn...
TCP SYN scans of the public IPv4 address space on port 443 completed on Oct 30-31, 2012 to measure the impact of Hurricane Sandy. Results from these scans we...
This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology. ... The Hybrid...
30 days of EMS logs in a large anonymized log file from an Energy Management System (EMS). ... The data in the file Event_Export_082217.csv includes 30 days ...
Multiple datasets containing cyber attacks against 2 laboratory scale industrial control systems; a gas pipeline and water storage tank. ... The data sets in...
This dataset is a collection of labeled RTU telemetry streams from a gas pipeline system in Mississippi State University's Critical Infrastructure Protection...
This dataset is split into three smaller datsets, which include measurements related to electric transmission system normal, disturbance, control, cyber atta...
This repository includes a series of PCAP captures generated for cybersecurity research purposes. Each capture set is provided as a release, namely: modbus T...
Infection Monkey is an open source Breach and Attack Simulation tool to evaluate the security posture of your network. ... The Infection Monkey is an attack ...
Infusion pump Control via OpenICE FROA App - Normal and Non-Normal State Data ... OpenIce FROA app with physical infusion pump Data captured from the loopba...
The Insider Threat Test Dataset is a collection of synthetic insider threat test datasets that provide both background and malicious actor synthetic data. .....
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol. ... IntelMQ is a solution for IT s...
UDP scan and meassurement of public UDP services that could be used in relation to Amplified DDoS attacks. ... The dataset consists of 20 UDP Services and 21...
The Internet-Wide Scan Data Repository is a public archive of research datasets that describe the hosts and sites on the Internet. ... These datasets contain...
The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (Ge...
The UNB ISCX IDS 2012 dataset consists of labeled network traces, including full packet payloads in pcap format. ... To simulate user behaviour, the behaviou...
IP Web Abuse Leaderboard ... This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank- Rank of UNRESOLVED...
IP Web Abuse Leaderboard contains a log of reports and status of the issue reported. ... This feed is filterable by Rank, Days Unresolved, Insidents Reported...
Regular scans of the IPv4 space conducted by Project 25499 ... This dataset contains scanning data from Project 25499. The files are in pairs, one contains t...
The ISOT Botnet dataset is the combination of several existing publicly available malicious and non-malicious datasets. ... Two separate datasets containing ...
The ISOT Fake News Dataset is a compilation of several thousands fake news and truthful articles, obtained from different legitimate news sites and sites fla...
This dataset consists of mouse gesture dynamics datasets, whereby 41 participants were asked to produce gesture samples using the mouse, and the dynamics wer...
Abuse e-mail feed contains a log of our abuse reports and status of the issue reported. ... This feed is filterable by e-mail address, IP address, or ASN nu...
Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way. ... Justniffer can emulate Apache web server l...
This data set consists of wide variety of intrusions simulated in a military network environment. ... This is the data set used for intrusion detector learni...
The Kharon dataset is a collection of Android malware totally reversed and documented. ... This collection gives as much as possible a representation of the ...
This dataset contains measurements of the latencies between a set of DNS servers. It was used as the basis for evaluating the Vivaldi network coordinate syst...
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. ... King Phisher features an easy to use, yet very...
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker....
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
IP Network Traffic Flows Labeled with 75 Apps ... The data presented here was collected in a network section from Universidad Del Cauca, Popayn, Colombia by...
The traces released here contain all incoming anonymous FTP connections (i.e. to port 21) to public FTP servers at the Lawrence Berkeley National Laboratory ...
Libnet provides a portable framework for low-level network packet construction. ... Libnet is an API to help with the construction and handling of network pa...
This dataset consists of system logs from a Linux Redhat 7.1 system deployed in a honeynet. ... The data has no sanitization or anonymization; the data is pr...
This dataset contains signatures generated from many Android APKs, and can be used separately from the detection engine. ... This dataset comes bundled with ...
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, networ...
A public malware dataset generated by Cuckoo Sandbox based on Windows OS API ... The dataset contains malware samples from eight different families: 832 spyw...
A new dataset of 66,301 malware recordings collected over a two-year period using Malrec. ... Malrec, a malware sandbox system, uses PANDA's whole-system det...
Malicious traffic detection system ... Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/o...
The Stratosphere IPS feeds itself with models created from real malware traffic captures. The Malware Capture Facility Project is in charge of continuously m...
A collection of malware samples caught by several honeypots. ... All of the malware samples contained in this repository have been collected by several honey...
Aim of the project is to provide an useful and classified dataset to researchers who want to investigate deeper in malware analysis by using Machine Learning...
This paper performs a large-scale measurement study of key sharing in today's web, and references several relevant datasets. ... The semantics of online auth...
This dataset was generated using the IDA disassembler tool. The task is to develop the best mechanism for classifying files in the test set into their respec...
Mozilla's real-time digital forensics and investigation platform. ... MIG is a platform to perform investigative surgery on remote endpoints. It enables inve...
MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform) ... MISP is an open source software s...
Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, d...
Modlishka is a powerful and flexible HTTP reverse proxy. ... Modlishka implements an entirely new and interesting approach of handling browser-based HTTP tra...
Moloch is a large scale, open source, indexed packet capture and search system. ... Moloch augments your current security infrastructure to store and index n...
Project Sonar includes a regular scan of IPv4 SSL/TLS services such as IMAP, POP3, SMTP. Sonar scans both the direct SSL and STARTTLS modes for these service...
Open port results for Rapid7's National Exposure reports ... The dataset represents the raw data collected that was used in the production of Rapid7's 2016-2...
Near real-time map of the Internet infrastructure detailing both submarine and terrestrial networks ... Network Atlas is a crowd-sourced near real-time map ...
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their ...
NetWorkPacketCapture is a tool used to capture network packet via Android VPN. ... NetWorkPacketCapture has the ability to: It can display every network conn...
Nishang - Offensive PowerShell for red team, penetration testing and offensive security. ... Nishang is a framework and collection of scripts and payloads w...
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. ... Nmap uses raw IP packets in novel ways to determin...
Stop denial of service attacks, configurable allowable burst rate. ... Configurable Denial-Of-Service prevention for http services.
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. ... Wi...
Normal state and failure mode simulation of mixed medical device production equivalent hospital network ... Normal state and failure mode simulation of mixed...
Normal state and failure mode data capture for Philips network medical devices. ... Normal state and failure mode data capture for Philips network devices. ...
Normal state, failure mode and attack simulation for medical laboratory camera system ... Microscope camera was powered via ethernet, connected over a local ...
Normal state, failure-mode and attack simulation of GE medical device monitoring network ... Normal state, failure-mode and attack simulation of GE medical d...
Normal state, failure-mode and attack simulation of Philips medical device monitoring network. ... Normal state, failure-mode and attack simulation of Philip...
An effective benchmark data set to help researchers compare different intrusion detection methods. ... NSL-KDD is a data set suggested to solve some of the i...
OpenCTI is an open source platform allowing organizations to manage its cyber threat intelligence knowledge and observables. ... OpenCTI has been created in ...
OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also ...
OpenVAS is a full-featured vulnerability scanner. ... The capabilities of OpenVAS include unauthenticated testing, authenticated testing, various high level ...
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real...
PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It provides C++ wrappers for packet processing engines su...
A Network Forensics Tool to visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and fi...
In this dataset, light is shed on the important features that have proved to be sound and effective in predicting phishing websites. ... Although many artic...
PhishTank is a community site that houses user-submitted phishing data ... PhishTank is a collaborative clearing house for data and information about phishin...
PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application ... ...
HAR files resulting from automatically visiting 35,000 popular Web sites with Google Chrome. ... This dataset is a set of HAR files resulting from the crawl ...
OpenWrt package for copying network packets without IPtables. ... A package that sends copies of network packets from your OpenWrt router to another device o...
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. ... A detailed overview of system activity w...
Project Sonar is a security research project by Rapid7 that conducts internet-wide surveys across different services and protocols to gain insights into glob...
Provider Net Abuse Leaderboard contains a log of reports and status of the issue reported (for issues blocked at the network level). ... This feed is filtera...
The Provider Web Abuse Leaderboard contains a log of reports and status of the issue reported (for issues blocked at the Web level). ... This feed is filter...
Psad is an Intrusion Detection and Log Analysis with iptables ... The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to...
Exploit Development and Reverse Engineering with GDB Made Easy ... pwndbg is a GDB plug-in that improves debugging with GDB, with a focus on features needed ...
Pwned Passwords are 555,278,657 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at m...
pythem is a multi-purpose pentest framework written in Python. ... pythem can test multiple different types of attacks and phishing instances such as: ARP s...
These malware samples are uploaded by users or from Rampart Research themselves. These datasets maybe useful as a training datasets to validate anti-virus en...
Ransomware Tracker offers various types of blocklists that allows you to block Ransomware botnet C&C traffic. ... The update interval for the available block...
Rapid7 Heisenberg Cloud Honeypot cowrie Logs ... This is an extract from Rapid7's Heisenberg Cloud global network of honeypot agents. It contains log entri...
The Real Data Corpus (RDC) is a collection of disk images extracted from secondary storage devices that were acquired from second-hand markets around the wor...
A tool for detecting regular expression denial-of-service vulnerabilities in Android apps. ... The tool requires a regular expression analyzer.Currently, the...
RegEx Denial of Service (ReDos) Scanner ... Helps find regular expressions susceptible to denial of service attacks.
DNS IPv4 PTR responses ... This dataset includes the responses to the IPv4 PTR lookups for all non-blacklisted/private IPv4 addresses. ; research@rapid7.co...
DNS IPv4 PTR responses from 2013-2017 ... This dataset includes the responses to the IPv4 PTR lookups for all non-blacklisted/private IPv4 addresses. Pleas...
Dataset containing RFMON (wireless monitoring) traces capturing transmitted MAC frames on the ORBIT testbed. ... In an experiment involving two senders and o...
Dataset of RSSI measurement on the ORBIT testbed. ... We performed experiments wherein noise injection was used as a method for mapping real world wireless n...
SandDroid is an automatic Android application analysis system ... Features of SandDroid: Static Analysis: Basic Information Extraction: file size, file hash...
Santa is a binary whitelisting/blacklisting system ... Santa consists of a kernel extension that monitors for executions, a userland daemon that makes execu...
Wireless probe requests collected in Rome between February and May 2013. ... Mobile devices try to automatically switch to WiFi connectivity whenever possibl...
Scan of the Alexa Top 1 Million for DNS servers that reply to AXFR requests. ... AXFR is a feature of DNS that is usually not meant to be publicly accessible...
This is a collection of malware datasets containing a mixed of virus and benign samples amounting to 2TB from SecureAge. ... Researchers will find this colle...
Crawl of the Alexa Top Million domains from October 5-7, 2016 using ZBrowse, a headless Chrome browser instrumented to track object dependencies. ... Crawl o...
Security Onion is a Linux distro for intrusion detection, enterprise security monitoring, and log management. ... Security Onion is a free and open source Li...
This dataset comprises PCAP data from the EternalBlue and EternalRomance malware. ... These PCAPs capture the actual exploits in action, on target systems th...
A labeled dataset with billions of records covering a wide variety of low-privileged monitorable smartphone features collected from 50 volunteers over a few ...
Generic Android Deobfuscator. Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identicall...
TCP SYN scan of the public IPv4 address space on port 443 to find SNI proxies, special TLS servers that forward traffic to the destination specified in the S...
Dataset of BitTorrent traffic on Korea Telecom's mobile WiMAX network. ... Dataset of BitTorrent traffic from Korea Telecom's mobile WiMAX network, collected...
Tcpdump traces from Korean Mobile WiMAX gaming network. ... These tcpdump traces were captured by Xiaofei Wang at Seoul National University during the study ...
The Software Assurance Reference Dataset (SARD) is a growing collection of over 170 000 programs with precisely located bugs. ... The programs are in C, C++,...
Sparta is a network infrastructure penetration testing tool ... SPARTA is a python GUI application which simplifies network infrastructure penetration testin...
Cybercrime is a profitable activity that traverses borders, but involves little risk. This dataset examines the nature and frequency of Internet usage; their...
Mobile phone records of German politician Malte Spitz. ... This data set contains 6 months of mobile phone records of German Green party politician Malte Spi...
Project Sonar includes a regular scan of IPv4 SSL services on TCP port 443 and from this stores metadata related to the X.509 certificates seen. ... The data...
Traceset of a privacy study, including encounters, sharing preferences, and accelerometer readings, conducted at University of St Andrews. ... This is the tr...
Encounter records of a group of participants carrying sensor motes and their social network data generated from Facebook data. ... This is a dataset of senso...
This dataset consists of alert logs from the Enterasys Dragon NIDS 4.x intrusion detection system. ... Date range of data: 2006-2007, 590 days of continuous ...
Traces of the Stanford CS department's wireless network. ... This dataset contains traces of the Stanford CS department's wireless network. ; dtang@cs.stanfo...
Dataset of mobile phone usage records collected with Nodobo suite at the University of Strathclyde. ... Dataset gathered by Nodobo, a suite of social sensor ...
SubFinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe ...
Dataset collected from a moving car equipped with a steerable directional antenna. ... This data set includes data traces that were collected from a moving c...
Data set consisting of measurements from two different wireless mesh network testbeds (802.11g and 802.11a). ... We conduct measurement using two mesh networ...
A catalog of malware used in the Syrian civil war. ... Each sample lists its respective MD5 hash, filename, links to any media sources or technical details w...
Project Sonar includes monthly probes of common TCP services across all of IPv4 ... The dataset contains regular snapshots of the responses to zmap probes ag...
tcpdump is a tool for network monitoring and data acquisition. ... Tcpdump uses libpcap, a system-independent interface for user-level packet capture. The pr...
1 day of Bluetooth connectivity and mobility data. ... Our study analyzes the limitations of Bluetooth-based trace acquisition initiatives carried out until ...
Python telnet honeypot for catching botnet binaries ... This project implements a python telnet server trying to act as a honeypot for IoT Malware which spre...
The BoT-IoT dataset was created by designing a realistic network environment in the Cyber Range Lab of The center of UNSW Canberra Cyber. The environment inc...
Channel energy levels from Wi-Fi networks as seen from a 802.15.4 radio. ... We use a sensor network composed of TelosB motes deployed in the library buildin...
Dataset of all visible APs of 13 hotspot locations in Seattle, WA over one week. ... The performance was measured and the application support of all visible ...
Round-trip Time-of-flight Measurements from a supermarket ... The dataset is meant to aid development and evaluation of indoor location in complex indoor env...
Tcpdump data set collected from a CDMA 1x EV-DO network in South Korea. ... Tcpdump data was collected from a CDMA 1x EV-DO network in South Korea that provi...
Sensor network dataset for enhancing CSMA MAC protocol. ... This dataset contains packet transmission traces collected from an experimental wireless sensor n...
Dataset of radiant light energy measurements. ... This dataset includes radiant light energy measurements from a study by Columbia University's EnHANTs (Ener...
200 hours of accelerometer information recorded over 25 days from 5 participants. ... To help us better understand the properties of various energy sources a...
Data concerning social interaction and propinquity based on wireless and bluetooth. ... This dataset comprises experiments carried out with the open-source m...
The goal of the dataset was to have a large capture of real botnet traffic mixed with normaltraffic and background traffic. The CTU-13 dataset consists in th...
Mobile phone records of Czech Ph.D. student Michal Ficek. ... This dataset contains 142 days of mobile phone records (aka Call Data Records) and ground-truth...
Dataset of RSS measurements collected at the University of Colorado Wide-Area Radio Testbed. ... This data was collected by Caleb Phillips at the University ...
Dataset of signal strength collected from 2.4 GHz directional antenna. ... We collected signal strength data to derive a parametric model for 2.4 GHz directi...
LTE Measurements on a 100m (triangular) grid on the University of Colorado Campus. ... This data was collected at the University of Colorado Boulder. It cont...
Dataset of received signal strength indication (RSSI) collected from within an indoor office building. ... This data set provides a comprehensive set of rece...
WiMax measurements made with a portable spectrum analyzer on the University of Colorado campus. ... This data was collected at the University of Colorado B...
Syslog, SNMP, and tcpdump data for 5 years or more from wireless network at Dartmouth College. ... This dataset includes syslog, SNMP, and tcpdump data for 5...
MANET dataset of outdoor experments for comparing differnet routing algorithms. ... This dataset contains outdoor runs of MANET (Mobile Ad-hoc network) routi...
Location-aware dataset for analyzing the errors in location estimates. ... The authors collected the dataset through war driving, i.e., collecting Wi-Fi beac...
Dataset of radio characteristics of 802.15.4 mobile person-to-person communications. ... The dataset contains results from a simple yet systematic set of ben...
The Drebin dataset contains 5,560 applications from 179 different malware families. The samples have been collected in the period of August 2010 to October 2...
Packet delivery performance (packet loss, delay, throughput, energy consumption) over a 802.15.4 link under vairous stack parameter configurations for more t...
Dataset of mobility traces of taxi cabs in San Francisco, USA. ... This dataset contains mobility traces of taxi cabs in San Francisco, USA. It contains GPS ...
Fingerprinting of wireless devices exploiting information leaked due to different device hardware compositions: Inter-Arrival-Time (IAT) of packets from wire...
A pcap file containing 122,989 anonymized Probe Requests sent by mobile devices at the Glimps 2015 music festival in Ghent, Belgium. ... A collection of 122,...
RFID tracking data collected from the seventh HOPE (Hackers On Planet Earth) conference held in July 18-20, 2008. ... RFID tracking data was collected from t...
SNMP records for a corporate research center (IBM Watson research center) over several weeks. ... This dataset includes SNMP records for a corporate research...
Mobile data collected using the Netalyzr for Android App. ... This dataset was collected by the ICSI Netalyzr app for Android to develop a characterization o...
Android app traffic (primarily video) ... Traces from Android apps (primarily video) collected under different values of parameters, such as video length, co...
Dataset of user session traces collected from Wi-Fi hotspots for six years. ... This data set contains user session traces which were collected from a large ...
Channel gain within a factory environment ... Measurement of the channel gain for multiple distances within a factory environment ; dimitri.block@hs-owl.de
Time- and frequency-variant 2.4 GHz ISM band channel gain ... The time- and frequency-variant channel gain is measured in the presence of an industrial cycli...
Connectivity and throughput measurement from home wireless networks. ... Measurements reflect connectivity and UDP/TCP throughput data collected from a grid ...
Location-aware dataset collected using Place Lab software. ... These traces contain 802.11, GSM and GPS trace data collected using Place Lab software, for 3 ...
GSM 900 MHz measurements from a spectrum analyzer combined with GPS measurements taken in an urban macrocell environment. ... Our measurement is performed ...
Dataset of transmission distance vs. packet loss measurement on a Wi-Fi network in rural areas. ... We conducted a series of measurements for relating tran...
Accelerometer samples collected through Android phones when driven on different vehicles ... This dataset consists of accelerometer samples collected throu...
Data set of CBR and VoIP traffic measurements from the WiBro network in Seoul, Korea. ... In order to evaluate QoS of VoIP applications over the WiBro netw...
Radio Signal Strength data from a mobile robot along with odometer in indoor and outdoor environments ... This dataset contains the RSS (Radio Signal Stren...
Micro-simulation of pedestrian mobility ... These traces are from simulation of walkers in a part of downtown Stockholm for which we vary several parameter...
Measurements of HTTP requests over 802.11 in dense wireless classrooms ... The common wisdom tells one not to attach more than 5-10 wireless devices to an ...
Measurements on real HTTP throughput via several 3G/LTE providers in Japan. ... While recent LTE provider promise very high rates, end users often complain...
Traces of signal strength of 802.11 APs for the COMPASS positioning system. ... COMPASS is a positioning system based on 802.11 and digital compasses. We app...
Traces of network activity at OSDI 2006. ... The authors gathered a detailed trace of network activity at OSDI 2006 to enable analysis of the behavior of a w...
Dataset of WiFi-based connectivity between basestations and vehicles in urban settings. ... We measured from VanLAN, a modest-size testbed that we have dep...
Traces of communication, proximity, location, and activity information from 100 subjects at MIT over the course of the 2004-2005 academic year. ... The aut...
Human mobility data collected from five different sites. ... We collected human mobilicty traces from five different sites - two university campuses (NCSU an...
Data set of 802.15.4 and 802.11b traces for investigating the biterror process of 802.15.4 and 802.11b networks. ... We collected 802.15.4 traces at NUST sch...
Dataset of experiments for the automated deployment of a multihop wireless network. ... To assess the feasibility of deploying wireless relays in real time...
Dataset of cattle movement and behavior monitoring collected at the University of Nottingham's Dairy Centre. ... We performed the field experiments of catt...
Bluetooth contact traces from shop employees of a shopping mall over six days. ... This is a dataset of real-world Bluetooth contact data colected from sho...
Network traces on the personal mobile devices of 12 trial participants over a period of one month in the February/March 2007 time frame. ... The CoSphere (...
Dataset of Bluetooth contact traces collected in Singapore from end 2005 to early 2006. ... This dataset contains Bluetooth contact traces collected in Sin...
Dataset of contact patterns among students, collected during the Spring semester of 2006 in National University of Singapore. ... The authors obtained the co...
DASH and WebRTC video delivery over GENI WiMAX ... This dataset describes measurements from Dynamic Adaptive Streaming over HTTP (DASH) and WebRTC video se...
This dataset contains mobility and connectivity traces extracted from GPS traces collected from the regional Fire Department of Asturias, Spain. ... This d...
Dataset of coverage and performance-related information of MetroFi, a 802.11x municipal wireless mesh network in Portland, Oregon in 2007. ... This is a da...
Dataset of wireless LAN traffic around Portland, Oregon using a commercial sniffer VWave. ... We collected six wireless LAN traffic traces around Portland,...
Dataset of animal movement traces collected from real-world ZebraNet deployments. ... The data contained in this data set are movement traces collected from ...
Outdoor temperature data collected by taxis in Rome, Italy. ... This dataset is to be used in conjunction with the roma/taxi dataset and provides the outdo...
Dataset of the movement of the fleet of city buses in Seattle. ... We acquired several weeklong traces of the movement of the fleet of city buses in Seattl...
Dataset of context information from cellular and Wi-Fi networks through participants from a major US urban area. ... We gathered field data about cellular ...
Smartphone records of accelerometer and compass readings, wireless network state, and application data usage collected for MiDAS project at Rice University. ...
Dataset of mobility traces of buses in Rio de Janeiro, Brasil. ... Real-time position data reported by buses, updated every minute, from the city of Rio de J...
Dataset of mobility traces of taxi cabs in Rome, Italy. ... This dataset contains mobility traces of taxi cabs in Rome, Italy. It contains GPS coordinates ...
Dataset of realistic workload and wired and wireless frame dump traces from experiments in the ORBIT testbed. ... This dataset includes realistic client arri...
The Sleuth Kit (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The libra...
the VERIS Community Database aims to collect and disseminate data breach information for all publicly disclosed data breaches ... VERIS and its accompanying ...
A repository of LIVE malware for your own joy and pleasure. theZoo's objective is to offer a fast and easy way of retrieving malware samples and source code ...
Traces of Bluetooth encounters, opportunistic messaging, and social profiles of 76 users of MobiClique application at SIGCOMM 2009. ... The dataset contains ...
SSLyze scans of POP, IMAP and SMTP related TCP ports, 20,000,000 IP/port combinations, Apr 2015 - August 2015 ... SSLyze results for e-mail related TCP ports...
A tool to analyze wireless MAC. ... Wit is a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational w...
PBProbe - a link capacity estimation tool for network links. ... PBProbe is a link capacity estimation tool that supports a wide range of links, including hi...
Locana - a visualization tool for 802.11-based positioning systems. ... Locana is a research tool for 802.11-based positioning systems. Locana visualizes the...
Loceva - an evaluation tool for 802.11-based positioning systems. ... Loceva is an evaluation tool for 802.11-based positioning systems. Loceva uses trace fi...
Wifidelity toolkit - Trace statistics and timing. ... The Wifidelity package consists of two tools to identify the completeness and accuracy of 802.11 packet...
WScout, lightweight PCAP file visualizer. ... WScout provides a PCAP traces visualizer that is able to work with huge traces (>10 GiB). Its goals ...
Wi-Fi network scanner/wardriving tool. ... Wi-Fi network scanner/wardriving tool used in the authors' MobiSys 2009 paper [pang-wifi-reports]. The main differ...
A tool for monitoring wireless statistics in real-time. ... WRAPI+ is a tool to monitor wireless statistics, including received signal strength, transmitted ...
Loclib - a collection tool for 802.11-based positioning systems. ... Loclib is a research tool for 802.11-based positioning systems. Loclib is a connector be...
Loctrace - a collection tool for 802.11-based positioning systems. ... Loctrace is a research tool for 802.11-based positioning systems. Loctrace gathers dat...
EXC is a software toolkit to control and steer experiments with wireless multihop networks. ... EXC is a software toolkit to control and steer experiments wi...
A PADS-based C library for processing snmp traces. ... snmp_parser provides a C library for processing snmp traces, and several tool implementations. Using t...
Tool to synchronize the timestamps of packets of 802.11-based experiments to a common time basis. ... Pcapsync is a tool to time-synchronize tracefiles recor...
A tool for selectively printing out header fields/flags from either live or recorded 802.11 traffic. ... This tool is able to select out header fields/flags ...
A simple C++ wrapper around libpcap for parsing 802.11 frames from the pcap file. ... A simple C++ wrapper around libpcap that allows applications to selecti...
IEEE 802.11 traces manipulation software ... WiPal is a piece of software dedicated to IEEE 802.11 traces manipulation. It comes as a set of programs and a C...
A tool for parsing Cisco and Aruba 802.11 syslog traces. ... syslog_parser is a script to parse the syslog traces from Cisco VxWorks, Cisco IOS and Aruba acc...
AnonTool - an open-source implementation of Anonymization API. ... AnonTool, an open-source implementation of Anonymization API, provides an easy to use, fle...
FLAIM - anonymize system and network logs. ... FLAIM is a multi-level, multi-log anonymization tool. FLAIM-Core comprises the anonymization engine and XML ba...
Adyton: A Network Simulator for Opportunistic Networks ... Adyton is an event-driven network simulator, written in C++, for Opportunistic Networks (a.k.a. De...
Daily scans of the Top 1 Million sites on the Web. It includes data on the presence and configuration of various HTTP Response Headers, details on the TLS co...
Real-world Internet traffic data collected from browsing, email chat, audio streaming, video streaming, voip, and p2p ... To be sure about the quantity and ...
Traces of Bluetooth activity in different urban environment and in some controlled setting. ... To investigate whether a large-scale Bluetooth worm outbreak ...
The data provided here represents what will only ever be used to abuse. IP Addresses, domains and usernames listed here will be returned in API results as "b...
Turbinia is an open-source framework for deploying, managing, and running distributed forensic workloads. ... Turbinia is intended to automate running of com...
Bluetooth connectivity dataset collected on a bus system at UC Davis. ... This data set includes several traces about the available Bluetooth connectivity du...
Multipath TCP traces from real smartphone users ... Multipath TCP is a recent TCP extension that enables multihomed hosts like smartphones to send and receiv...
Dataset collected by wireless monitoring at 2005 IETF meeting. ... This dataset includes the traces collected by wireless monitoring at the 62nd Internet Eng...
Dataset for detailed link quality information collected over several days from the UCSB MeshNet. ... Detailed link quality information was collected over sev...
Dataset of comprehensive traces of wireless activity in the UCSD Computer Science building. ... To characterize the sources of delay in 802.11 production net...
SNMP and tcpdump records from 4 access points at a three-day computer-science conference. ... This dataset includes SNMP and tcpdump records from 4 access po...
Project Sonar produces multiple UDP datasets every week. This data is gathered by sending protocol-specific UDP probes across the entire IPv4 address space. ...
A Dataset for the Evaluation of Cyclostationarity-Based Network IDS ... The dataset is built with real traffic and up-to-date attacks. These data come from s...
Dataset of Bluetooth and Wi-Fi traces collected from Android phone users at University of Illinois. ... This is the dataset of MACs of Bluetooth and Wi-Fi ac...
The Ultimate Hosts Blacklist is a curated Unified Hosts file for protecting your computer or device against over several hundred thousand bad web sites ... T...
The bus-based DTN (Disruption-tolerant networks) traces from UMass Amherst campus. ... This dataset includes the real mobility and real transfers of the bus-...
Dataset of 802.11g long-distance measurements over ad-hoc nodes using directional antennas. ... Our experiments consisted of 802.11g wireless network through...
Dataset of wireless network measurement in the SIGCOMM 2008 conference. ... We collected a trace of wireless network activity at SIGCOMM 2008. The subjects o...
Dataset of RSS measurements of a Mica2 sensor network deployed at the University of Michigan. ... This is a dataset of RSS measurements collected by Mica2 se...
War-walking data set collected in different cities in the United States for the field study and evaluation of an access point selection system. ... We collec...
Modern web applications make frequent use of third-party scripts, often in ways that allow scripts loaded from external servers to make unrestricted changes ...
Traces of Bluetooth encounters, Facebook friendships and interests of a set of users collected through SocialBlueConn application at University of Calabria ....
The Unified Host and Network Dataset is a subset of network and computer (host) events collected from the Los Alamos National Laboratory enterprise network o...
Dataset of mobility traces collected by Pocket Mobility Trace Recorder devices at University of Milano. ... This dataset contains mobility traces from 44 mob...
Bluetooth encounters from the cambridge/haggle dataset (v. 2009-05-29) have been converted into the StandardEventsReader format for use in the ONE simulator....
Data set of RF recordings of several communication signals captured by a real time spectrum analyzer. ... In order to be used for examples or projects in com...
Trace of wireless contacts, social connections, and user interests, performed in an academic environment for 63 days, with 72 participants ... Wireless conta...
Bluetooth encounter trace collected from Android phones in an academic environment. ... This is the data from an Android Bluetooth tracing experiment perform...
Traces of Bluetooth sightings by groups of users carrying iMotes. ... This data includes a number of traces of Bluetooth sightings by groups of users carryin...
Traces of Bluetooth sightings by groups of rollerbladers carrying iMotes. ... This data includes traces of any opportunistic sighting of Bluetooth devices by...
This dataset contains traces of 802.11p packets, collected in an anechoic chamber and outdoors in Porto (Portugal) in 2011, with and without the presence of ...
This dataset contains traces of 802.11p packets, collected in a rural area located in the periphery of Aachen (Germany) in 2012, with the presence of an RF j...
Dataset of wireless signal strength measurements from the University of Puerto Rico. ... This data set contains a collection of wireless traces from the Univ...
URLhaus offers an API to both, receive (download) and submit malware URLs from the URLhaus database. ... The URLhaus database dump is a simple CSV feed that ...
USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as method of use polici...
VPN session, DHCP log, and trap log data from wireless network at USC. ... This dataset includes VPN session, DHCP log, and tcap log data, for 79 access poin...
User-Computer Authentication Events Data ... This anonymized data set encompasses 9 continuous months and represents 708,304,516 successful authentication ev...
Measured CIR (Channel Impulse Response) Data Set. ... This dataset contains over 9300 measured CIR (channel impulse responses) in a 44-node wireless network....
Location-aware dataset for extracting significant places. ... Real, long-term data collected from three participants using a Place Lab client, from which the...
Dataset of wireless network measurement in SIGCOMM 2004 conference. ... We are trying to understand how well 802.11 networks work in practice and how they ca...
Localization data set collected from a radio interferometric tracking system. ... We collected localization traces from a radio interferometric tracking syst...
VirusShare is a collection of malware used for malware analysis and machine learning. ... The VirusShare dataset is a repository of malware samples to provid...
Volatility is an advanced memory forensics framework. ... The Volatility Framework is a completely open collection of tools,implemented in Python under the G...
The UNB ISCX Network Traffic (VPN-nonVPN) dataset consists of labeled network traffic, including full packet in pcap format and csv (flows generated by ISCXF...
Dataset of routing and topology traces collected during MANIAC Challenge. ... The dataset comprises routing and topology traces collected during the Mobile A...
Waidps is a wireless Auditing, Intrusion Detection & Prevention System ... WAIDPS is an open source wireless swissknife written in Python and work on Linux e...
A github repository that contains a collection of web attack payloads from various sources. ... Requests extracted from either packet captures or log files o...
Tor is a tool that is susceptible to website fingerprinting ... When browsing the web, many users would prefer to have privacy. Clients who wish to avoid beh...
CRAWDAD is the Community Resource for Archiving Wireless Data At Dartmouth, a wireless network data resource for the research community. This archive has the...
Wireshark is the world's foremost and widely-used network protocol analyzer. ... Wireshark lets you see what's happening on your network at a microscopic lev...
Dataset of RF device usage measurements collected using a signal analyzer for use by Airshark. ... This is a dataset of RF device usage measurements collecte...
Network performance data collected with WiScape framework. ... Dataset of network performance data collected with WiScape framework from three commercial cel...
A repository of over 35,000 phrases, patterns, and keywords commonly used by spammers and comment bots in usernames, email addresses, link text, and URIs. .....
Xplico is an open source network forensic analysis tool ... The goal of Xplico is extract from an internet traffic capture the applications data contained. F...
This dataset includes sanitized password frequency lists collected from Yahoo in May 2011. ... Each of the 51 .txt files represents one subset of all users' ...
Mobility data collected by LifeMap monitoring system at Yonsei University in Seoul. ... We deployed our mobility monitoring system, called LifeMap, to collec...
Publicly available Zonefiles parsed into a sqlite3 database. ... A sqlite3 database of Zonefiles compiled from publicly available sources, that is updated on...