www.secrepo.com
Open in
urlscan Pro
66.33.221.139
Public Scan
URL:
http://www.secrepo.com/
Submission: On January 24 via manual from PH — Scanned from DE
Submission: On January 24 via manual from PH — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Security Repo * Home * About * Contact * Data * Created * Network * System * Malware * Other * File * * 3rd Party * Other * Network * Malware * System * File * Password * Threat Feeds * Misc SECREPO.COM - SAMPLES OF SECURITY RELATED DATA Finding samples of various types of Security related can be a giant pain. This is my attempt to keep a somewhat curated list of Security related data I've found, created, or was pointed to. If you perform any kind of analysis with any of this data please let me know and I'd be happy to link it from here or host it here. Hopefully by looking at others research and analysis it will inspire people to add-on, improve, and create new ideas. All data generated and hosted by Security Repo is done so under the following license (exceptions noted where applicable). Security Repo by Mike Sconzo is licensed under a Creative Commons Attribution 4.0 International License Q: How do you give without having to do anything? A: Simply visit this site. I've decided that I'm going to start posting the logs from this site to the site. It's a great way to open source some data, and after a few discussions I don't think any privacy will be violated. If I receive a lot of backlash about this decision perhaps I'll reverse it, but until further notice web logs for this domain will be available here. -------------------------------------------------------------------------------- Data Created * Network * MACCDC2012 - Generated with Bro from the 2012 dataset A nice dataset that has everything from scanning/recon through explotation as well as some c99 shell traffic. Roughly 22694356 total connections. * conn.log.gz (524MB) * dhcp.log.gz (1MB) - Description for dhcp dataset and analysis on jupyter notebook * dns.log.gz (7MB) - Description for dhcp dataset and analysis on jupyter notebook * files.log.gz (49MB) - Description for files dataset and analysis on jupyter notebook * ftp.log.gz (1MB) - Description for ftp dataset and analysis on jupyter notebook * http.log.gz (54MB) - Description for http dataset and analysis on jupyter notebook * notice.log.gz (1MB) - Description for notice dataset and analysis on jupyter notebook * signatures.log.gz (1MB) - Description for signatures dataset and analysis on jupyter notebook * smtp.log.gz (1MB) - Description for smtp dataset and analysis on jupyter notebook * ssh.log.gz (1MB) - Description for ssh dataset and analysis on jupyter notebook * ssl.log.gz (2MB) - Description for ssl dataset and analysis on jupyter notebook * tunnel.log.gz (1MB) - Description for tunnel dataset and analysis on jupyter notebook * weird.log.gz (2MB) - Description for weird dataset and analysis on jupyter notebook Snort logs * maccdc2012_fast_alert.7z Snort Fast Alert format logs (10MB) * maccdc2012_full_alert.7z Snort Full Alert format logs (24MB) * Bro logs generated from various Threatglass samples Exploit kits and benign traffic, unlabled data. 6663 samples available. * Part 1 (64MB) - Description for Part 1 dataset and analysis on jupyter notebook * Part 2 (41MB) - Description for Part 2 dataset and analysis on jupyter notebook * Part 3 (61MB) - Description for Part 3 dataset and analysis on jupyter notebook * Snort logs generated from various Threatglass samples Exploit kits and benign traffic, unlabled data. 6663 samples available. * tg_snort_fast.7z Snort Fast Alert format logs (5MB) * tg_snort_full.7z Snort Full Alert format logs (9MB) * Gameover Zeus DGA sample 31000 DGA domains from Dec 2014 * Domain Transfer Data Old domain transefer data from several registrars, JSON format. (8MB) * Modbus and DNP3 logs ICS logs generated w/Bro from various PCAPs (1MB) * Malware * Static information about Zeus binaries - Static information (JSON) of about ~8k samples from ZeuS Tracker * Description for Zeus Binaries dataset and analysis on jupyter notebook * Static information about APT1 binaries - Static information (JSON) of APT1 samples from VirusShare * Description for VirusShare Dataset and analysis on jupyter notebook * Static information about Op Cleaver binaries - Static information of Op Cleaver related binaries. * Description for OPCleaver Dataset and analysis on jupyter notebook * System * Web Logs from Security Repo - these logs are generated by you the community, and me updating this site. * Squid Access Log - combined from several sources (24MB compressed, ~200MB uncompresed) * auth.log - approx 86k lines, and mostly failed SSH login attempts * Honeypot data - Data from various honeypots (Amun and Glastopf) used for various BSides presentations posted below. Approx 994k entries, JSON format. * Analysis of the honeypot data for BSidesDFW 2014 - IPython Notebook. * Other * Security Data Analysis Labs * Connection Log - (522MB compressed, 3GB uncompressed) ~22million flow events 3rd Party * Other * Digital Corpora - Disk images, network traffic, and malware, oh my! [License Info: This material is based upon work supported by the National Science Foundation under Grant No. 0919593] * Verizon VERIS Database - Raw VERIS (filtered) data. [License Info: Creative Commons Attribution-ShareAlike 4.0 International Public License] * The Swedish Defence Research Agency Information Warfare Lab PCAP and various log sources [License Info: Unknown] * Black-Market Archives A scraped archive of Dark Net Markets [License Info: Unknown] * Protected Repository for the Defense of Infrastructure Against Cyber Threats Lots of data (restricted use) [License Info: License] * Comprehensive, Multi-Source Cyber-Security Events Auth, DNS, process, and flow data. [License Info: Public Domain] * Cyber Security Science Multiple datasets from LANL. [License Info: Public Domain] * Open Source Enterprise Network Security Solution Network traffic and malicious endpoint data. [License Info: Unknown] * Australian Defence Force Academy Linux (ADFA-LD) and Windows (ADFA-WD) Datasets HIDS data [License Info: Free for academic research only] * CCSS - Digital Certs Used by Malare - A listing of certificate serial numbers that have been used by malware [License Info: Unknown] * SherLock Dataset - Smartphone dataset with software and hardware sensor information surrounding mobile malware [License Info: 3 year full access, listed on site] * payloads - A collection of web attack payloads. [License Info: Unknown] * AZSecure Intelligence and Security Informatics Data Sets - various data sets around mostly web data [License Info: Citing] * security-datasets - A collection of resources for security data [License Info: Various] * Mordor Gates - Pre-recorded security events generate by simulated adversarial techniques. [License Info: GPLv3] * "What is this panel again?" - Screenshots of various malware control panels. [License Info: Unknown] * Awesome Misinformation - A curated list of awesome misinformation. [License Info: MIT] * Sweetie data - a collection of honeypot data (network and files). [License Info: MIT] * Network * KDD Cup 1999 Data - Network connection data [License Info: Unknown] * NETRESEC - Publicly available PCAP files - loads of great PCAP files [License Info: Unknown] * Internet-Wide Scan Data Repository - Various types of scan data [License Info: Unknown] * Detecting Malicious URLs - Mirror - URLS/features/labels [License Info: Unknown] * hackertarget 500K HTTP Headers - HTTP Headers [License Info: Unknown] * Threatglass - PCAPs that contain various exploit kits as well as some legit traffic mixed in. [License Info: Unknown] * pcapr - Searchable repository of PCAPs, look for various phrases to pull out the Security related ones (eg. exploit, xss, etc...) [License Info: TOS] * OpenDNS public domain lists - various domain lists [License Info: Public Domain] * MIT 1999 DARPA Intrusion Detection Evaluation Data Set - Labeled attack and nont attack data (PCAP and system logs) [License Info: Unknown] * MIT 1998 DARPA Intrusion Detection Evaluation Data Set - Network and file system data [License Info: Unknown] * DDS legit and DGA labeled domains - DDS Blog [License Info: Unknown] * Honeypot Data - DDS Blog [License Info: Unknown] * Honeypot Data with GeoIP info - DDS Blog [License Info: Unknown] * DGA Domains - updated frequently [License Info: License] * Malware URLs - updated daily list of domains and URLs associated with malware [License Info: Disclaimer posted in link] * UDP Scan data - provided by Rapid7 [License Info: Unknown] * Continously updated IP block list - Created by Packetmail (?) [License Info: no for-sale or paywall use] * Common Crawl - "open repository of web crawl data that can be accessed and analyzed by anyone" [License Info: Open] * Malware Traffic Analysis - a site with labled exploit kits and phishing emails. [License Info: Unknown] * Simple Web Traces - Cloud Storage, DDoS, DNSSEC, and may more types of PCAPs. [License Info: Various] * SiLK - LBNL-05 Anonymized enterprise packet header traces. [License Info: Unknown] * DGA Archive Multiple DGA data sets generated by the actual algorithm vs. captured network traffic. [License Info: CC BY-NC-SA 3.0] * Information Security Centre of Excellence (ISCX) Data related to Botnets and Android Botnets. [License Info: Unknown] * CSIC 2010 HTTP Dataset Labeled (normal, anomalous) HTTP data in CSV format. [License Info: Unknown] * VAST Challenge 2012 IDS logs generated by IEEE [License Info: Unknown] * University of Victoria Botnet Dataset Malicious and benign traffic from LBNL and Ericsson (merged publically available data)[License Info: Unknown] * UCSD Network Telescope Dataset on the Sipscan Public and restricted datasets of various malware and other network traffic. [License Info: Available on dataset page] * UNSW-NB15 This data set has nine families of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. (CSV data) [License Info: Unknown] * Stratosphere IPS Public Datasets PCAPs, Samples, etc... [License Info: Unknown] * Awesome Industrial Control System Security - Has links to SCADA PCAPs and other SCADA related resources [License Info: Apache License 2.0 (site), Data: various] * Cisco Umbrella Popularity List - Top 1 million most daily popular domains [License Info: Unknown] * Alexa Top 1 Million - The static 1 million most popular sites by Alexa [License Info: Unknown] * Using machine learning to detect malicious URLs - Cade and labeled URL data. [License Info: Unknown] * Majestic Million Domains - Top million domains with the most referring subnets. [License Info: Attribution 3.0 Unported (CC BY 3.0)] * IoT device captures IoT Device PCAP by Aalto University Research [License Info: Listed on site] * Project Bluesmote - Syrian Bluecoat Proxy Logs [License Info: Public Domain] * Data for a Black Hat 2017 Handout - Various types of data (network, host, etc...) for different use cases (e.g. Remote Exploitation, Spear Phishing, Ransomware, WebShell) [License Info: Apache 2] * Aktion Open Source Exploit Detection Tool - Variety of different kinds of data centered around exploit detection [License Info: Apache 2] * Atkion V2 Open Source Exploit Detection Tool - Variety of different kinds of data centered around exploit detection [License Info: Apache 2] * 2017-SUEE-data-set - PCAP files that show various HTTP attack (slowloris, slowhttptest, slowloris-ng) [License Info: Unknown] * UCI ML Repository - Website Phishing Data Set A collection of Phishing Websites as well as legitimate ones. [License Info: Listed on site] * 2007 TREC Public SPAM Corpus - SPAM Corpus [License Info: Listed on site] * ML Driven Web Application Firewall - Machine learning driven web application firewall to detect malicious queries with high accuracy (URL data) [License Info: Unknown] * West Point NSA Data Sets - Snort IDS, DNS Service, and Web Server logs. [License Info: Unknown] * Phish-IRIS - A small scale multi-class phishing web page screenshots archive [License Info: Listed on site] * DGArchive - Samples of DGA domains from various types of malware. [License Info: Contact for access/info] * Netlab360 DGA Domains - Samples of DGA domains from various types of malware. License Info: Unknown] * Quantcast Top Sites - Most popular sites on the Internet according to Quantcast. [License Info: Unknown] * DomCop Top 1M - Top One Million sites according to DomCop. [License Info: Unknown] * Blackweb Domains - A project that aims to categorize as many domains as possible, also provies a whitelist. [License Info: Unknown] * Charles University SIS Access Log Dataset - The package contains an anonymized server log collected on a live installation of a student information system run by Charles University between May and November 2018 [License Info: Creative Commons Attribution 4.0 International] * Malware * The Malware Capture Facility Project - Published long-runs of malware including network information. Make sure to check out the Labeled CTU-13 Dataset [License Info: Unknown] * PANDA Malware Analysis - Execution traces and PCAPs from Moyix's PANDA setup [License Info: Unknown] * Op Cleaver PANDA Analysis - rrlogs, PCAPs, movies and reports from Op Cleaver malware [License Info: Unknown] * kaggle Malware Classification - Unlabled malware, but there are solutions to label it! [License Info: Unknown] * PlugX Chronicles Various PlugX samples and links to information about PlugX [License Info: Unknown] * Labeled VirusShare data by @_delta_zero - VirusShare data that has been consitently labeled (7zip download) [License Info: Unknown] * lynx Project Samples - Benign samples that behave like malware (lynx Project) [License Info: Unknown] * VirusSign - Free and Paid account access to several million malware samples [License Info: Unknown] * Open Malware - Searchable malware repo with free downloads of samples [License Info: Unknown] * Malware DB by Malekal - A list of malicious files, complete with sample link and some AV results [License Info: Unknown] * Drebin Dataset - Android malware, must submit proof of who you are for access. [License Info: Listed on site] * EMBER Dataset - Features and labels from 1.1 million benign/malicious PE files with trained model. [License Info: AGPL-3.0] * MalwareTrainingSets - JSON describing several intrusion sets/threat actors [License Info: Listed on GitHub] * Malware-Feed - An ongoing and updated archive of files that we collect which are associated with specific public malicious threat reports.[License Info: MIT] * Malware Sample Sources - A Collection of Malware Sample Repositories [License Info: Unknown] * Blue Hexagon Open Dataset for Malware AnalysiS - A dataset containing timestamped malware samples and well-curated family information for research purposes. [License Info: Unknown] * System * DDS Dataset Collection - Honeypot related data [License Info: Unknown] * Website Classification [License Info: Public Domain, info on site] * ECML/PKDD 2010 Discovery Challenge Data Set - Web classification data [License Info: Unknown] * PANDA rrlogs - share and download rrlogs from the PANDA dynamic analysis platform [License Info: Unknown] * Threat Research Private - Encrypted data collected from SSH honeypots [License Info: Unknown] * Threat Research - Data collected from SSH honeypots (fork of the original Andrew Morris collection)[License Info: Unknown] * Sample logs and scripts for Alienvault - Various log types (SSH, Cisco, Sonicwall, etc..) [License Info: Unknown] * #nginx IRC channel logs - Bot logs [License Info: Unknown] * Public Security Log Sharing Site - misc. system logs, NIDS logs, and web proxy logs [License Info: Public, site source (details at top of page)] * CERT Insider Threat Tools - "These datasets provide both synthetic background data and data from synthetic malicious actors" [License Info: Unknown] * ADFA IDS Datasets - The datasets cover both Linux and Windows; they are designed for evaluation by system call based HIDS. [License Info: Listed on site] * Workshop on AI and Security - Anonomized Windows Audit Logs. [License Info: Apache 2.0] * Threat Research - Honeypot data [License Info: Unknown] * EVTX Attack Samples - Windows events samples associated to specific attack and post-exploitation techniques"> [License Info: Unknown] * File * contagio malware dump - A resource for files/data regarding targeted attacks [License Info: Unknown] * VirusShare.com - Because Sharing is Caring [Login Required] - Huge collection of downloadable/torrentable malware files for various architectures [License Info: Unknown] * Vx Heaven - sorted by AV set of virus samples (available via BitTorrent) [License Info: Unknown] * TechHelpList SPAM List - Samples of SPAM messages and associated threat that was delivered in addition to other rich information [License Info: Unknown] * MalShare - A community driven public malware repository. [License Info: TOS] * URLhaus - Daily malware batches. [License Info: CC-0] * MALWAREbazzar - Daily malware batches. [License Info: CC-0] * Password * Yahoo! Password Frequency Corpus - This dataset includes sanitized password frequency lists collected from Yahoo in May 2011. [License Info: CC-0] * Threat Feeds * ISP Abuse Email Feed - Feed showing IOCs from various Abuse reports (other feeds also on the site) [License Info: Unknown] * VXvault - List of URLs and MD5s that are malicious [License Info: Unknown] * AlienVault OTX - Build your own threat feed from community contributors, complete with API [License Info: Legal Info] * Tracker - Malware hashes and their associated campaigns [License Info: About] * Malware Domain List - Labeled malicious domains and IPs [License Info: Unknown] * Clean MX Phishing DB - URLs and IPs associated with phishing emails, also targets are listed where determined [License Info: Unknown] * Clean MX Virus DB - Labeled URLs and IPs associated with various types of malware [License Info: Unknown] * TechHelpList MalTLQR Upatre and Dyreza Tracker - IPs and hashes for Upatre and Dyreza families [License Info: Unknown] * CyberCrime Tracker - Labled URLs and IPs for various malware families [License Info: Unknown] * CyberCrime ZbotScan - List of hashes associated with various Zbot variants [License Info: Unknown] * abuse.ch trackers - Trackers for ransomeware, ZeuS, SSL Blacklist, SpyEye, Palevo, and Feodo [License Info: Unknown] * Unit 42 Indicators - Indicators from the Unit 42 reports [License Info: Unknown] * Threat Feeds - Threat feed aggregator [License Info: Various] * C2IntelFeeds - Automatically created C2 feeds, currently VPNs and various C2. [License Info: Unknown] -------------------------------------------------------------------------------- Contact If you dig the site, have data, need data, or whatever, find me on Twitter or GitHub. -------------------------------------------------------------------------------- Misc Various things that I needed to stick someplace. * BSidesDFW 2014 Presentation with Roxy - Honeypot Howto * BSidesAustin 2015 Presentation with Roxy - Honeypot Howto Security Repo - Last updated: Sun Jan 23 18:15:01 PST 2022