elementalsouls commited on
Commit
17a84a2
·
verified ·
1 Parent(s): 194e1fd

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +0 -5
README.md CHANGED
@@ -1,21 +1,16 @@
1
  # Redteam-Operations-Datasets
2
-
3
  A comprehensive dataset for training, benchmarking, and documenting offensive/red-team operations in Active Directory and hybrid environments.
4
 
5
  ## Structure
6
-
7
  - `datasets/` — All dataset files, organized by attack phase, tactic, and technique.
8
  - `datasets/schema/record.schema.json` — Canonical schema for dataset records.
9
  - `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
10
 
11
-
12
  ## Usage
13
-
14
  - For fine-tuning LLMs, benchmarking detection, or creating mindmaps/playbooks.
15
  - Each file is a JSONL (one record per line), see the example schema below.
16
 
17
  ## Example Record
18
-
19
  ```json
20
  {"instruction": "Scan Network", "input": "nxc smb <ip_range>", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."}
21
  {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."}
 
1
  # Redteam-Operations-Datasets
 
2
  A comprehensive dataset for training, benchmarking, and documenting offensive/red-team operations in Active Directory and hybrid environments.
3
 
4
  ## Structure
 
5
  - `datasets/` — All dataset files, organized by attack phase, tactic, and technique.
6
  - `datasets/schema/record.schema.json` — Canonical schema for dataset records.
7
  - `datasets/*.jsonl` — Task-specific datasets, each line is a JSON object.
8
 
 
9
  ## Usage
 
10
  - For fine-tuning LLMs, benchmarking detection, or creating mindmaps/playbooks.
11
  - Each file is a JSONL (one record per line), see the example schema below.
12
 
13
  ## Example Record
 
14
  ```json
15
  {"instruction": "Scan Network", "input": "nxc smb <ip_range>", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."}
16
  {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."}