The dataset viewer is not available for this split.
Error code: StreamingRowsError
Exception: CastError
Message: Couldn't cast
id: string
product_name: string
vendor: string
description: string
strengths: string
weaknesses: string
detection_capabilities: string
evasion_resistance_score: string
price_range: string
deployment_model: string
source_url: string
-- schema metadata --
huggingface: '{"info": {"features": {"id": {"dtype": "string", "_type": "' + 571
to
{'id': Value('string'), 'evasion_technique_id': Value('string'), 'detection_name': Value('string'), 'description': Value('string'), 'rule_type': Value('string'), 'rule_content': Value('string'), 'log_source': Value('string'), 'false_positive_rate': Value('string'), 'source_url': Value('string')}
because column names don't match
Traceback: Traceback (most recent call last):
File "/src/services/worker/src/worker/utils.py", line 99, in get_rows_or_raise
return get_rows(
^^^^^^^^^
File "/src/libs/libcommon/src/libcommon/utils.py", line 272, in decorator
return func(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/utils.py", line 77, in get_rows
rows_plus_one = list(itertools.islice(ds, rows_max_number + 1))
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2543, in __iter__
for key, example in ex_iterable:
^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2060, in __iter__
for key, pa_table in self._iter_arrow():
^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2083, in _iter_arrow
for key, pa_table in self.ex_iterable._iter_arrow():
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 544, in _iter_arrow
for key, pa_table in iterator:
^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 383, in _iter_arrow
for key, pa_table in self.generate_tables_fn(**gen_kwags):
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/packaged_modules/parquet/parquet.py", line 180, in _generate_tables
yield Key(file_idx, batch_idx), self._cast_table(pa_table)
^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/packaged_modules/parquet/parquet.py", line 143, in _cast_table
pa_table = table_cast(pa_table, self.info.features.arrow_schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
id: string
product_name: string
vendor: string
description: string
strengths: string
weaknesses: string
detection_capabilities: string
evasion_resistance_score: string
price_range: string
deployment_model: string
source_url: string
-- schema metadata --
huggingface: '{"info": {"features": {"id": {"dtype": "string", "_type": "' + 571
to
{'id': Value('string'), 'evasion_technique_id': Value('string'), 'detection_name': Value('string'), 'description': Value('string'), 'rule_type': Value('string'), 'rule_content': Value('string'), 'log_source': Value('string'), 'false_positive_rate': Value('string'), 'source_url': Value('string')}
because column names don't matchNeed help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
EDR/XDR Evasion Techniques - English Dataset
Comprehensive bilingual dataset on EDR/XDR evasion techniques, designed for red team and blue team professionals. This dataset covers offensive techniques, detection rules, EDR/XDR solution comparisons and detailed Q&A.
Dataset Contents
1. evasion_techniques (~40 techniques)
Evasion techniques organized by category:
- Memory Evasion: AMSI bypass, ETW patching, NTDLL unhooking, shellcode injection, module stomping, Phantom DLL hollowing
- Userland Hooking Bypass: Direct syscalls (SysWhispers, Hell's Gate, Halo's Gate), manual mapping, hardware breakpoints, indirect syscalls
- EDR Agent Tampering: PPL bypass, minifilter tampering, kernel callback removal, ETW provider disabling, WMI abuse
- Living off the Land (LOLBins): MSBuild, InstallUtil, Regsvr32, CMSTP, Mshta, certutil, bitsadmin, rundll32, PowerShell CLM bypass
- Sandbox/VM Detection: Hardware fingerprinting, timing-based detection, user interaction checks, environment artifacts
- Network Evasion: Domain fronting, DNS tunneling, encrypted C2, legitimate service abuse, protocol impersonation
2. detection_rules (~25 rules)
Multi-format detection rules:
- Sigma rules for generic detection
- KQL queries for Microsoft Defender for Endpoint
- YARA rules for memory and static analysis
- Sysmon configurations for telemetry collection
3. edr_comparison (15 solutions)
Detailed comparison of major EDR/XDR solutions with evasion resistance scores.
4. questions_answers (80 Q&A)
In-depth questions and answers covering all aspects of EDR evasion and detection.
Usage
from datasets import load_dataset
dataset = load_dataset("AYI-NEDJIMI/edr-evasion-en")
# Access evasion techniques
for technique in dataset["evasion_techniques"]:
print(f"{technique['id']}: {technique['name']}")
# Access detection rules
for rule in dataset["detection_rules"]:
print(f"{rule['rule_type']}: {rule['detection_name']}")
# Q&A
for qa in dataset["questions_answers"]:
print(f"Q: {qa['question']}")
print(f"A: {qa['answer'][:100]}...")
Reference Articles
This dataset is based on research and articles published by AYI-NEDJIMI Consultants:
- EDR/XDR Evasion Techniques - Complete guide to evasion and detection techniques
- Top 10 EDR/XDR Solutions 2025 - Detailed market solution comparison
- Threat Hunting with Microsoft 365 Defender and Sentinel - Practical threat hunting guide
- Top 10 Active Directory Attacks - AD attack and defense techniques
- White Paper: Anatomy of a Ransomware Attack - Complete ransomware analysis
About the Author
AYI-NEDJIMI Consultants is a cybersecurity consulting firm specializing in red teaming, blue teaming, detection engineering and incident response. Our experts help organizations secure their infrastructure against advanced threats.
- Website: https://ayinedjimi-consultants.fr
- Free Resources: Articles, white papers and cybersecurity datasets
- HuggingFace Collection: AYI-NEDJIMI
License
This dataset is distributed under the MIT license. For educational and security research purposes only.
Citation
@dataset{ayinedjimi_edr_evasion_en_2025,
title={EDR/XDR Evasion Techniques - English Dataset},
author={AYI-NEDJIMI Consultants},
year={2025},
publisher={HuggingFace},
url={https://huggingface.co/datasets/AYI-NEDJIMI/edr-evasion-en}
}
Author
Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert
Related Articles
- Evasion EDR/XDR
- Top 10 EDR/XDR 2025
- Threat Hunting M365 Defender Sentinel
- Top 10 Attaques Active Directory
- Livre Blanc Anatomie Ransomware
Free Cybersecurity Resources
- Livre Blanc NIS 2
- Livre Blanc Sécurité Active Directory
- Livre Blanc Pentest Cloud AWS/Azure/GCP
- Livre Blanc Sécurité Kubernetes
- Livre Blanc IA Cyberdéfense
- Livre Blanc Anatomie Ransomware
- Guide Sécurisation AD 2025
- Guide Tiering Model AD
Part of the Collection
This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.
- Downloads last month
- 24