Create README.md
#1
by
Canstralian
- opened
README.md
ADDED
@@ -0,0 +1,130 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
---
|
2 |
+
license: mit
|
3 |
+
task_categories:
|
4 |
+
- text-classification
|
5 |
+
- token-classification
|
6 |
+
- summarization
|
7 |
+
language:
|
8 |
+
- en
|
9 |
+
pretty_name: OSINT Dataset
|
10 |
+
---
|
11 |
+
|
12 |
+
# Dataset Card for originalbox/osint
|
13 |
+
|
14 |
+
This dataset card aims to be a base template for the **originalbox/osint** dataset, which is focused on Open Source Intelligence (OSINT) data.
|
15 |
+
|
16 |
+
## Dataset Details
|
17 |
+
|
18 |
+
### Dataset Description
|
19 |
+
|
20 |
+
This dataset contains OSINT-related data that can be used for security analysis, threat intelligence, and information gathering. It includes data collected from publicly available sources that can aid in the investigation and analysis of digital threats, security risks, and vulnerabilities.
|
21 |
+
|
22 |
+
- **Curated by:** originalbox
|
23 |
+
- **Funded by [optional]:** [More Information Needed]
|
24 |
+
- **Shared by [optional]:** [More Information Needed]
|
25 |
+
- **Language(s) (NLP):** English
|
26 |
+
- **License:** [More Information Needed]
|
27 |
+
|
28 |
+
### Dataset Sources [optional]
|
29 |
+
|
30 |
+
- **Repository:** [Link to Dataset Repository on Hugging Face]
|
31 |
+
- **Paper [optional]:** [More Information Needed]
|
32 |
+
- **Demo [optional]:** [More Information Needed]
|
33 |
+
|
34 |
+
## Uses
|
35 |
+
|
36 |
+
### Direct Use
|
37 |
+
|
38 |
+
This dataset is suitable for use in:
|
39 |
+
- Threat intelligence analysis
|
40 |
+
- Cybersecurity research and development
|
41 |
+
- OSINT tools development and improvement
|
42 |
+
- Vulnerability detection and analysis
|
43 |
+
|
44 |
+
### Out-of-Scope Use
|
45 |
+
|
46 |
+
This dataset should not be used for:
|
47 |
+
- Any illegal or malicious activities
|
48 |
+
- Activities that could compromise the security or privacy of individuals
|
49 |
+
- Misuse of OSINT data for non-compliant or unethical purposes
|
50 |
+
|
51 |
+
## Dataset Structure
|
52 |
+
|
53 |
+
The dataset includes structured data relevant to OSINT investigations. It may include information like:
|
54 |
+
- Publicly available security data
|
55 |
+
- Threat reports
|
56 |
+
- IP addresses, domain names, and URLs of interest
|
57 |
+
- Metadata related to online activities and networks
|
58 |
+
|
59 |
+
## Dataset Creation
|
60 |
+
|
61 |
+
### Curation Rationale
|
62 |
+
|
63 |
+
The **originalbox/osint** dataset was created to provide a comprehensive source of OSINT for cybersecurity professionals, researchers, and developers working on security tools and intelligence platforms.
|
64 |
+
|
65 |
+
### Source Data
|
66 |
+
|
67 |
+
The source data includes publicly available online data, such as:
|
68 |
+
- Security databases
|
69 |
+
- Threat intelligence feeds
|
70 |
+
- Publicly accessible metadata
|
71 |
+
- Digital footprints from online platforms
|
72 |
+
|
73 |
+
#### Data Collection and Processing
|
74 |
+
|
75 |
+
The data was collected using a combination of automated scraping and manual verification from publicly accessible OSINT sources. The dataset was processed to remove any irrelevant or non-actionable data points.
|
76 |
+
|
77 |
+
#### Who are the source data producers?
|
78 |
+
|
79 |
+
The source data was generated from a combination of OSINT scraping tools and public threat intelligence feeds. The producers of this data are independent security researchers and OSINT collection platforms.
|
80 |
+
|
81 |
+
### Annotations [optional]
|
82 |
+
|
83 |
+
#### Annotation process
|
84 |
+
|
85 |
+
The dataset is not annotated but contains raw data points for analysis.
|
86 |
+
|
87 |
+
#### Who are the annotators?
|
88 |
+
|
89 |
+
No external annotators were used for this dataset.
|
90 |
+
|
91 |
+
#### Personal and Sensitive Information
|
92 |
+
|
93 |
+
The dataset does not contain any personal or sensitive information unless it is publicly available within the context of OSINT sources.
|
94 |
+
|
95 |
+
## Bias, Risks, and Limitations
|
96 |
+
|
97 |
+
While the dataset provides valuable OSINT, users should be cautious of potential biases and limitations in the data:
|
98 |
+
- The data may only represent a portion of the total available OSINT on the internet.
|
99 |
+
- Some sources may be outdated or unreliable.
|
100 |
+
- The dataset does not guarantee complete accuracy or real-time relevance of the information.
|
101 |
+
|
102 |
+
### Recommendations
|
103 |
+
|
104 |
+
Users should verify the relevance and timeliness of the data before using it for critical decision-making or analysis. Cross-referencing with other OSINT sources is recommended.
|
105 |
+
|
106 |
+
## Citation [optional]
|
107 |
+
|
108 |
+
**BibTeX:**
|
109 |
+
|
110 |
+
[More Information Needed]
|
111 |
+
|
112 |
+
**APA:**
|
113 |
+
|
114 |
+
[More Information Needed]
|
115 |
+
|
116 |
+
## Glossary [optional]
|
117 |
+
|
118 |
+
- **OSINT:** Open Source Intelligence refers to data and information gathered from publicly available sources.
|
119 |
+
|
120 |
+
## More Information [optional]
|
121 |
+
|
122 |
+
For further details, refer to the dataset repository or related OSINT documentation.
|
123 |
+
|
124 |
+
## Dataset Card Authors [optional]
|
125 |
+
|
126 |
+
originalbox
|
127 |
+
|
128 |
+
## Dataset Card Contact
|
129 |
+
|
130 |
+
[More Information Needed]
|