The dataset viewer is not available for this split.
Error code: FeaturesError
Exception: ArrowInvalid
Message: JSON parse error: Column(/status_code) changed from number to string in row 450
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 160, in _generate_tables
df = pandas_read_json(f)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 38, in pandas_read_json
return pd.read_json(path_or_buf, **kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 815, in read_json
return json_reader.read()
File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1025, in read
obj = self._get_object_parser(self.data)
File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1051, in _get_object_parser
obj = FrameParser(json, **kwargs).parse()
File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1187, in parse
self._parse()
File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1403, in _parse
ujson_loads(json, precise_float=self.precise_float), dtype=None
ValueError: Trailing data
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/split/first_rows.py", line 228, in compute_first_rows_from_streaming_response
iterable_dataset = iterable_dataset._resolve_features()
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 3357, in _resolve_features
features = _infer_features_from_batch(self.with_format(None)._head())
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 2111, in _head
return next(iter(self.iter(batch_size=n)))
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 2315, in iter
for key, example in iterator:
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 1856, in __iter__
for key, pa_table in self._iter_arrow():
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 1878, in _iter_arrow
yield from self.ex_iterable._iter_arrow()
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 476, in _iter_arrow
for key, pa_table in iterator:
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/iterable_dataset.py", line 323, in _iter_arrow
for key, pa_table in self.generate_tables_fn(**gen_kwags):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 163, in _generate_tables
raise e
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 137, in _generate_tables
pa_table = paj.read_json(
File "pyarrow/_json.pyx", line 308, in pyarrow._json.read_json
File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status
File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status
pyarrow.lib.ArrowInvalid: JSON parse error: Column(/status_code) changed from number to string in row 450Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
WAF Detection Dataset Overview This dataset is designed for identifying and fingerprinting Web Application Firewalls (WAFs) through advanced, unconventional payloads. It supports cybersecurity researchers, penetration testers, and data scientists in analyzing WAF behavior, detection techniques, and bypass strategies. The dataset includes 650 entries, each representing a unique WAF interaction with carefully crafted malicious payloads. Dataset Structure The dataset is in JSONL (JSON Lines) format, where each line is a valid JSON object with the following fields:
waf_id: Unique identifier for the entry (integer, 1–650).
target: Target URL (e.g., https://secure.network.com).
waf: WAF provider (e.g., Cloudflare, AWS WAF, Imperva).
status_code: HTTP status code returned (e.g., 403, 406).
headers: Key-value pairs of response headers (e.g., {"Server": "cloudflare"}).
payload: Malicious payload used (e.g., obfuscated SQL injection, XSS).
technique: Detection method (e.g., Error Code + Header, JS Payload Blocked).
description: Brief description of the payload and WAF detection.
Example Entry
{
"waf_id": 451,
"target": "https://secure.network.com",
"waf": "Cloudflare",
"status_code": "403",
"headers": {"Server": "cloudflare", "CF-Ray": "6e8f2d4b"},
"payload": "uNiOn/*%0d%0a*/SeLeCt/*%0a%0d*/1,2,3,null,null,null--%0a%0c",
"technique": "Error Code + Header",
"description": "SQL injection with multiline comments, nulls, and form feed padding blocked by Cloudflare header"
}
Key Features
Diverse WAF Providers: Includes 34 WAFs, such as Cloudflare, AWS WAF, FortiWeb, Imperva, Akamai, Sucuri, F5 BIG-IP, and more.
Sophisticated Payloads: Features deeply obfuscated SQL injections, multi-layered encoded XSS, nested command injections, and protocol manipulations with randomized padding.
Realistic Scenarios: Simulates real-world WAF interactions with unique domains, realistic headers, and varied detection techniques.
Comprehensive Techniques: Covers error codes, headers, cookies, and payload-specific blocks for robust fingerprinting.
Usage
Download: Obtain the dataset (waf_detection_dataset.jsonl) from the repository. Parse: Use a JSONL parser (e.g., Python’s json module) to process the file.
import json
with open('waf_detection_dataset.jsonl', 'r') as f:
for line in f:
entry = json.loads(line)
print(entry['waf'], entry['payload'])
Analyze: Leverage the dataset for WAF fingerprinting, machine learning model training, or penetration testing research. Test: Use payloads responsibly in controlled environments with permission to evaluate WAF configurations.
Applications
WAF Fingerprinting: Identify WAF presence and type based on response patterns.
Penetration Testing: Develop and test WAF bypass techniques.
Machine Learning: Train models for automated WAF detection and classification.
Security Research: Study WAF behavior against advanced attack vectors.
Contribution Guidelines
Add Entries: Submit new entries with unique payloads or WAFs via pull requests.
Validate Format: Ensure JSONL syntax and field consistency.
Ethical Use: Only contribute payloads tested in authorized environments.
Issues: Report errors or suggestions via the issue tracker.
License This dataset is licensed under the MIT License. See LICENSE for details.
Disclaimer This dataset is for educational and research purposes only. Do not use payloads in unauthorized systems or networks. The authors are not responsible for misuse. Contact For questions or feedback, open an issue or contact [email protected].
- Downloads last month
- 14