http://www.secrepo.com 安全相关的数据获取源
来自:http://www.secrepo.com
- Network
- MACCDC2012 - Generated with Bro from the 2012 dataset
- A nice dataset that has everything from scanning/recon through explotation as well as some c99 shell traffic. Roughly 22694356 total connections.
- conn.log.gz (524MB)
- dhcp.log.gz (1MB)
- dns.log.gz (7MB)
- files.log.gz (49MB)
- ftp.log.gz (1MB)
- http.log.gz (54MB)
- notice.log.gz (1MB)
- signatures.log.gz (1MB)
- smtp.log.gz (1MB)
- ssh.log.gz (1MB)
- ssl.log.gz (2MB)
- tunnel.log.gz (1MB)
- weird.log.gz (2MB)
- Snort logs
- maccdc2012_fast_alert.7z Snort Fast Alert format logs (10MB)
- maccdc2012_full_alert.7z Snort Full Alert format logs (24MB)
- Bro logs generated from various Threatglass samples
- Snort logs generated from various Threatglass samples
- Exploit kits and benign traffic, unlabled data. 6663 samples available.
- tg_snort_fast.7z Snort Fast Alert format logs (5MB)
- tg_snort_full.7z Snort Full Alert format logs (9MB)
- Gameover Zeus DGA sample 31000 DGA domains from Dec 2014
- Domain Transfer Data Old domain transefer data from several registrars, JSON format. (8MB)
- Modbus and DNP3 logs ICS logs generated w/Bro from various PCAPs (1MB)
- MACCDC2012 - Generated with Bro from the 2012 dataset
- Malware
- Static information about Zeus binaries - Static information (JSON) of about ~8k samples from ZeuS Tracker
- Static information about APT1 binaries - Static information (JSON) of APT1 samples from VirusShare
- Static information about Op Cleaver binaries - Static information of Op Cleaver related binaries.
- System
- Web Logs from Security Repo - these logs are generated by you the community, and me updating this site.
- Squid Access Log - combined from several sources (24MB compressed, ~200MB uncompresed)
- auth.log - approx 86k lines, and mostly failed SSH login attempts
- Honeypot data - Data from various honeypots (Amun and Glastopf) used for various BSides presentations posted below. Approx 994k entries, JSON format.
- Analysis of the honeypot data for BSidesDFW 2014 - IPython Notebook.
- Other
- Security Data Analysis Labs
- Connection Log - (522MB compressed, 3GB uncompressed) ~22million flow events
3rd Party
- Other
- Digital Corpora - Disk images, network traffic, and malware, oh my! [License Info: This material is based upon work supported by the National Science Foundation under Grant No. 0919593]
- Verizon VERIS Database - Raw VERIS (filtered) data. [License Info: Creative Commons Attribution-ShareAlike 4.0 International Public License]
- The Swedish Defence Research Agency Information Warfare Lab PCAP and various log sources [License Info: Unknown]
- Black-Market Archives A scraped archive of Dark Net Markets [License Info: Unknown]
- Protected Repository for the Defense of Infrastructure Against Cyber Threats Lots of data (restricted use) [License Info: License]
- Comprehensive, Multi-Source Cyber-Security Events Auth, DNS, process, and flow data. [License Info: Public Domain]
- Cyber Security Science Multiple datasets from LANL. [License Info: Public Domain]
- Open Source Enterprise Network Security Solution Network traffic and malicious endpoint data. [License Info: Unknown]
- Australian Defence Force Academy Linux (ADFA-LD) and Windows (ADFA-WD) Datasets HIDS data [License Info: Free for academic research only]
- CCSS - Digital Certs Used by Malare - A listing of certificate serial numbers that have been used by malware [License Info: Unknown]
- SherLock Dataset - Smartphone dataset with software and hardware sensor information surrounding mobile malware [License Info: 3 year full access, listed on site]
- payloads - A collection of web attack payloads. [License Info: Unknown]
- Network
- KDD Cup 1999 Data - Network connection data [License Info: Unknown]
- NETRESEC - Publicly available PCAP files - loads of great PCAP files [License Info: Unknown]
- Internet-Wide Scan Data Repository - Various types of scan data [License Info: Unknown]
- Detecting Malicious URLs - Mirror - URLS/features/labels [License Info: Unknown]
- hackertarget 500K HTTP Headers - HTTP Headers [License Info: Unknown]
- Threatglass - PCAPs that contain various exploit kits as well as some legit traffic mixed in. [License Info: Unknown]
- pcapr - Searchable repository of PCAPs, look for various phrases to pull out the Security related ones (eg. exploit, xss, etc...) [License Info: TOS]
- OpenDNS public domain lists - various domain lists [License Info: Public Domain]
- MIT 1999 DARPA Intrusion Detection Evaluation Data Set - Labeled attack and nont attack data (PCAP and system logs) [License Info: Unknown]
- MIT 1998 DARPA Intrusion Detection Evaluation Data Set - Network and file system data [License Info: Unknown]
- DDS legit and DGA labeled domains - DDS Blog [License Info: Unknown]
- Honeypot Data - DDS Blog [License Info: Unknown]
- Honeypot Data with GeoIP info - DDS Blog [License Info: Unknown]
- DGA Domains - updated frequently [License Info: License]
- Malware URLs - updated daily list of domains and URLs associated with malware [License Info: Disclaimer posted in link]
- UDP Scan data - provided by Rapid7 [License Info: Unknown]
- Continously updated IP block list - Created by Packetmail (?) [License Info: no for-sale or paywall use]
- Common Crawl - "open repository of web crawl data that can be accessed and analyzed by anyone" [License Info: Open]
- Malware Traffic Analysis - a site with labled exploit kits and phishing emails. [License Info: Unknown]
- Simple Web Traces - Cloud Storage, DDoS, DNSSEC, and may more types of PCAPs. [License Info: Various]
- SiLK - LBNL-05 Anonymized enterprise packet header traces. [License Info: Unknown]
- DGA Archive Multiple DGA data sets generated by the actual algorithm vs. captured network traffic. [License Info: CC BY-NC-SA 3.0]
- Information Security Centre of Excellence (ISCX) Data related to Botnets and Android Botnets. [License Info: Unknown]
- CSIC 2010 HTTP Dataset Labeled (normal, anomalous) HTTP data in CSV format. [License Info: Unknown]
- VAST Challenge 2012 IDS logs generated by IEEE [License Info: Unknown]
- University of Victoria Botnet Dataset Malicious and benign traffic from LBNL and Ericsson (merged publically available data)[License Info: UNKOWN]
- UCSD Network Telescope Dataset on the Sipscan Public and restricted datasets of various malware and other network traffic. [License Info: Available on dataset page]
- UNSW-NB15 This data set has nine families of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. (CSV data) [License Info: Unknown]
- Stratosphere IPS Public Datasets PCAPs, Samples, etc... [License Info: Unknown]
- Awesome Industrial Control System Security - Has links to SCADA PCAPs and other SCADA related resources [License Info: Apache License 2.0 (site), Data: various]
- Cisco Umbrella Popularity List - Top 1 million most daily popular domains [License Info: Unknown]
- Alexa Top 1 Million - The static 1 million most popular sites by Alexa [License Info: Unknown]
- Using machine learning to detect malicious URLs - Cade and labeled URL data. [License Info: Unknown]
- Majestic Million Domains - Top million domains with the most referring subnets. [License Info: Attribution 3.0 Unported (CC BY 3.0)]
- IoT device captures IoT Device PCAP by Aalto University Research [License Info: Listed on site]
- Project Bluesmote - Syrian Bluecoat Proxy Logs [License Info: Public Domain]
http://www.secrepo.com 安全相关的数据获取源的更多相关文章
- 介绍Kubernetes监控Heapster
什么是Heapster? Heapster是容器集群监控和性能分析工具,天然的支持Kubernetes和CoreOS,Kubernetes有个出名的监控agent—cAdvisor.在每个kubern ...
- 【Beta阶段】第二次Scrum Meeting!
每日任务内容: 本次会议为第二次Scrum Meeting会议~ 由于本次会议项目经理召开时间较晚,所以在公寓7层召开,所以女生没来…召开时间大家集会10分钟,经理与后端探讨20分钟. 队员 昨日完成 ...
- 浅析Python装饰器
1.什么是装饰器 在介绍装饰器之前,我们先来思考一个问题:使用Python语言进行程序设计时,如果我们想扩展一个函数的功能,一般会怎么做呢? 比如,有一个名为print_info函数,当前该函数内只做 ...
- SDWebImage源码解读 之 NSData+ImageContentType
第一篇 前言 从今天开始,我将开启一段源码解读的旅途了.在这里先暂时不透露具体解读的源码到底是哪些?因为也可能随着解读的进行会更改计划.但能够肯定的是,这一系列之中肯定会有Swift版本的代码. 说说 ...
- ABP源码分析十九:Auditing
审计跟踪(也叫审计日志)是与安全相关的按照时间顺序的记录,它们提供了活动序列的文档证据,这些活动序列可以在任何时间影响一个特定的操作. AuditInfo:定义如下图中需要被Audit的信息. Aud ...
- iOS开发之Alamofire源码解析前奏--NSURLSession全家桶
今天博客的主题不是Alamofire, 而是iOS网络编程中经常使用的NSURLSession.如果你想看权威的NSURLSession的东西,那么就得去苹果官方的开发中心去看了,虽然是英文的,但是结 ...
- 源码解析-Volley(转自codeKK)
Volley 源码解析 本文为 Android 开源项目源码解析 中 Volley 部分项目地址:Volley,分析的版本:35ce778,Demo 地址:Volley Demo分析者:grumoon ...
- Spark Shuffle数据处理过程与部分调优(源码阅读七)
shuffle...相当重要,为什么咩,因为shuffle的性能优劣直接决定了整个计算引擎的性能和吞吐量.相比于Hadoop的MapReduce,可以看到Spark提供多种计算结果处理方式,对shuf ...
- bigworld源码分析(3)——dbMgr分析
dbMgr主要是玩家数据的读取和保存的,例如在bigworld源码分析(3)中,玩家在认证的时候,loginApp需要通过dbMgr来验证玩家数据是否合法,这就是针对玩家的账号数据进行查询.本篇中,我 ...
随机推荐
- 英语发音规则---T字母
英语发音规则---T字母 一.总结 一句话总结: 1.T一般发[t]? ten [ten] num.十 letter [ˈletə(r)] n.信; 证书 meet [mi:t] vt.& v ...
- Bootstrap表格内容居中
1.<th style='text-align: center;'>host</th> 水平居中 2.<td rowspan=$row_host1 style='vert ...
- .NET序列化工具Jil、Json.NET和Protobuf的简单测评
前一段时间逛园子的时候发现有人比较了Jil.Json.NET和Protobuf的性能,一时好奇,也做了个测试,这里记录下来,以供查阅. 前期准备 依赖类库的话,可以通过Nuget在公共组件库总下载,这 ...
- Qt-信号和槽-1对1
前言:信号和槽是Qt的核心机制,窗体和控件对象之间的沟通一般都使用信号和槽. 对于部件有哪些信号和槽,可以查看help文档. 一.使用自定义槽 1.1 新建工程 新建工程,新建Widget类(基于QW ...
- Java 系列之spring学习--springmvc注解方式(五)
一.springmvc注解方式 注解方式使用的更多,更加灵活.在上一篇的博客的基础上修改springmvc-servlet.xml配置文件. <?xml version="1.0&qu ...
- visio中如何取消跨线和去掉页边距
比较来说,写论文visio和inkscape都不可缺少. 比如visio跨线的问题,已经遇到过两次忘记了.这次截个图作为记录.其实就是在“设计”一栏里,把连接线里面的跨线显示的对勾去掉即可. *** ...
- 查看网站域名IP地址
运行:CMD 输入: Nslookup 网站地址 示例: Nslookup httpwww.baidu.com 我们是筑梦团队,我们的座右铭是:当提起逐梦的脚步,也请举起筑梦的双手
- Html5必看:教你如何选择移动APP开发框架
如何选择移动APP开发框架一直是困扰很多新手的难题,今天杭州APP开发小编就和大家一起分享一下HTML5 移动app开发过程中框架该如何选择?当然我们得先从下面几个方面来评估一个框架的优越性,然后再做 ...
- 页面定制CSS代码初探(六):h2、h3 标题自动生成序号 详细探索过程
前言 最近在整理博客写作格式的规范,碰到一个问题:标题要不要加序号? 直到我碰到一个人这么说 手动维护编号实在是一件很闹心的事情, 如果位置靠前的某个段落被删除了, 那么几乎每个段落的编号都要手动修改 ...
- Unity 已下载工程包存放路径
Mac Finder 中 Shift+Command+G输入后回车 ~/Library/Unity/Asset Store-5.x Windows 么有,自己上别的网站查去~