|
--- |
|
license: cc-by-nc-sa-4.0 |
|
dataset: Synthetic_PenTest_Reports_100k |
|
tags: |
|
- cybersecurity |
|
- penetration-testing |
|
- red-team |
|
- infosec |
|
- CVE |
|
- ethical-hacking |
|
- LLM-training |
|
language: |
|
- en |
|
pretty_name: 100k Synthetic Automated Penetration Test Reports |
|
size_categories: |
|
- 100K+ |
|
task_categories: |
|
- text-classification |
|
- summarization |
|
- question-answering |
|
- document-question-answering |
|
- text-generation |
|
--- |
|
|
|
|
|
|
|
# 📄 100 Samples of Synthetic Automated Penetration Test Reports |
|
|
|
This dataset contains **100+ realistic, synthetic penetration testing reports** structured to simulate professional internal security assessments. Each record models the full flow of a pentest engagement, including: |
|
|
|
- Reconnaissance / Discovery Phase |
|
- Vulnerability Assessment (with CVE tagging) |
|
- Exploitation Attempts (success/failure) |
|
- Final Risk Ratings and Recommendations |
|
|
|
These reports are **ideal for training LLMs, security copilots, vulnerability classifiers, and summarization agents** focused on cybersecurity operations and incident response. |
|
|
|
--- |
|
|
|
## 📚 Dataset Structure |
|
|
|
Each entry includes: |
|
|
|
- **Test Metadata**: ID, tester, organization, IPs, confidentiality level |
|
- **Discovery Phase**: Simulated `nmap` or banner-grab output |
|
- **Vulnerability Assessment**: CVEs, CVSS scores, tools used (ZAP, Burp Suite, Metasploit) |
|
- **Exploitation Results**: Command-line tools, outcomes, reverse shell sessions |
|
- **Risk Summary**: Confidence level, remediation, OWASP-aligned recommendations |
|
|
|
All entities such as hostnames, ports, and vulnerabilities are synthetically generated for training purposes. No real systems or data are used. |
|
|