--- license: cc-by-nc-sa-4.0 dataset: Synthetic_PenTest_Reports_100k tags: - cybersecurity - penetration-testing - red-team - infosec - CVE - ethical-hacking - LLM-training language: - en pretty_name: 100k Synthetic Automated Penetration Test Reports size_categories: - 100K+ task_categories: - text-classification - summarization - question-answering - document-question-answering - text-generation --- # 📄 100 Samples of Synthetic Automated Penetration Test Reports This dataset contains **100+ realistic, synthetic penetration testing reports** structured to simulate professional internal security assessments. Each record models the full flow of a pentest engagement, including: - Reconnaissance / Discovery Phase - Vulnerability Assessment (with CVE tagging) - Exploitation Attempts (success/failure) - Final Risk Ratings and Recommendations These reports are **ideal for training LLMs, security copilots, vulnerability classifiers, and summarization agents** focused on cybersecurity operations and incident response. --- ## 📚 Dataset Structure Each entry includes: - **Test Metadata**: ID, tester, organization, IPs, confidentiality level - **Discovery Phase**: Simulated `nmap` or banner-grab output - **Vulnerability Assessment**: CVEs, CVSS scores, tools used (ZAP, Burp Suite, Metasploit) - **Exploitation Results**: Command-line tools, outcomes, reverse shell sessions - **Risk Summary**: Confidence level, remediation, OWASP-aligned recommendations All entities such as hostnames, ports, and vulnerabilities are synthetically generated for training purposes. No real systems or data are used.