{"id":24270,"date":"2023-12-01T18:27:15","date_gmt":"2023-12-01T17:27:15","guid":{"rendered":"https:\/\/www.graviton.at\/letterswaplibrary\/where-to-start-for-offensive-cybersecurity-dataset\/"},"modified":"2023-12-01T18:27:15","modified_gmt":"2023-12-01T17:27:15","slug":"where-to-start-for-offensive-cybersecurity-dataset","status":"publish","type":"post","link":"https:\/\/www.graviton.at\/letterswaplibrary\/where-to-start-for-offensive-cybersecurity-dataset\/","title":{"rendered":"Where To Start For Offensive Cybersecurity Dataset?"},"content":{"rendered":"<p><!-- SC_OFF --><\/p>\n<div class=\"md\">\n<p>Looking to create a offensive and defensive cybersecurity techniques dataset. The dataset would be used for a class project for teaching and refining an AI model chat responses. Can anyone recommend some sources and what a row\/column would look like? I know the preferred method is quantitative data so how would this work with qualitative data? Also, any recommendations for web scraping application besides me developing a script? Thanks<\/p>\n<\/div>\n<p><!-- SC_ON -->   submitted by   <a href=\"https:\/\/www.reddit.com\/user\/Aisechopeful\"> \/u\/Aisechopeful <\/a> <br \/> <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/188ejyo\/where_to_start_for_offensive_cybersecurity_dataset\/\">[link]<\/a><\/span>   <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/188ejyo\/where_to_start_for_offensive_cybersecurity_dataset\/\">[comments]<\/a><\/span><\/p><div class='watch-action'><div class='watch-position align-right'><div class='action-like'><a class='lbg-style1 like-24270 jlk' href='javascript:void(0)' data-task='like' data-post_id='24270' data-nonce='65e0e39b87' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.graviton.at\/letterswaplibrary\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-24270 lc'>0<\/span><\/a><\/div><\/div> <div class='status-24270 status align-right'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>Looking to create a offensive and defensive cybersecurity techniques dataset. The dataset would be used for a&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-24270","post","type-post","status-publish","format-standard","hentry","category-datatards","wpcat-85-id"],"_links":{"self":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/24270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/comments?post=24270"}],"version-history":[{"count":0,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/24270\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/media?parent=24270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/categories?post=24270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/tags?post=24270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}