darkknight25's picture
Update README.md
8a0e443 verified
metadata
license: mit
task_categories:
  - text-classification
language:
  - en
pretty_name: sunny thakur
size_categories:
  - n<1K

Phishing and Benign Email Dataset

This dataset contains a curated collection of phishing and legitimate (benign) emails for use in cybersecurity training, phishing detection models, and email classification systems. Each entry is structured with subject, body, intent, technique, target, and classification label.


πŸ“ Dataset Format

The dataset is stored in .jsonl (JSON Lines) format. Each line is a standalone JSON object.

Fields:

Field Description
id Unique email ID
subject Email subject line
body Full email content
intent Purpose of the email (e.g., credential harvesting, malware delivery)
technique Social engineering or technical trick used
target Who or what is being impersonated
spoofed_sender Forged email address
label "phishing" or "benign"

πŸ” Example Entry

{
  "id": "phish-0003",
  "subject": "Unusual Activity Detected",
  "body": "Suspicious login from Russia. Reset password now: https://g00gle-security.com",
  "intent": "Credential Harvesting",
  "technique": "Homoglyph Link Spoofing",
  "target": "Google",
  "spoofed_sender": "no-reply@g00gle.com",
  "label": "phishing"
}
βœ… Use Cases

    Train NLP models to detect phishing content

    Classify or filter email threats in spam filters

    Educate users and red teams on phishing techniques

    Simulate email-based social engineering scenarios

πŸ“Š Dataset Summary

    πŸ” Phishing Emails: ~100 entries

    βœ… Benign Emails: ~100 entries

    βš–οΈ Balanced and ready for binary classification or LLM pretraining

⚠️ Disclaimer

This dataset is for research and educational purposes only. Do not use these emails in live environments. The authors are not responsible for misuse.
πŸ“œ License

This dataset is released under the MIT License.
πŸ“« Contributions

Feel free to submit pull requests to add more phishing or legit emails. The more diverse, the better for training secure systems.