CJJones's picture
Update README.md
1310b08 verified
---
license: cc-by-nc-sa-4.0
dataset: Synthetic_PenTest_Reports_100k
tags:
- cybersecurity
- penetration-testing
- red-team
- infosec
- CVE
- ethical-hacking
- LLM-training
language:
- en
pretty_name: 100k Synthetic Automated Penetration Test Reports
size_categories:
- 100K+
task_categories:
- text-classification
- summarization
- question-answering
- document-question-answering
- text-generation
---
# 📄 100 Samples of Synthetic Automated Penetration Test Reports
This dataset contains **100+ realistic, synthetic penetration testing reports** structured to simulate professional internal security assessments. Each record models the full flow of a pentest engagement, including:
- Reconnaissance / Discovery Phase
- Vulnerability Assessment (with CVE tagging)
- Exploitation Attempts (success/failure)
- Final Risk Ratings and Recommendations
These reports are **ideal for training LLMs, security copilots, vulnerability classifiers, and summarization agents** focused on cybersecurity operations and incident response.
---
## 📚 Dataset Structure
Each entry includes:
- **Test Metadata**: ID, tester, organization, IPs, confidentiality level
- **Discovery Phase**: Simulated `nmap` or banner-grab output
- **Vulnerability Assessment**: CVEs, CVSS scores, tools used (ZAP, Burp Suite, Metasploit)
- **Exploitation Results**: Command-line tools, outcomes, reverse shell sessions
- **Risk Summary**: Confidence level, remediation, OWASP-aligned recommendations
All entities such as hostnames, ports, and vulnerabilities are synthetically generated for training purposes. No real systems or data are used.