- https://www.malware-traffic-analysis.net/index.html
Since 2013 this site continues to publish malicious network traffic captures with PCAPs to download..
- https://www.pcapanalysis.com
Download PCAPs from Malware, Exploit Kits, DDoS Attacks, Network Traffic & Everything Inbetween
- https://www.netresec.com/?page=PcapFiles
This is a list of public packet capture repositories, which are freely available on the Internet. Includes CTF PCAPs, various application samples, captured malware traffic from honeypots, sandboxes or real world intrusions.
- https://github.com/thongsia/Public-Pcaps
Antoher large list of various places to find pcaps
- https://github.com/david415/honeybadger-pcap-files
PCAPs with TCP injection attacks from.
- https://www.secrepo.com/
Curated list of Security related data
- https://www.stratosphereips.org/datasets-overview
Has multiple data sets/models created from real malware traffic captures. Inside these datasets are anything from netflow, pcaps, connection summaries, passivedns, actualy logs themselves, etc...
- https://archive.wrccdc.org/pcaps/2019/
PCAPs from 2019 Western Regional Collegiate Cyber Defense Competition
- https://github.com/aol/moloch/tree/master/tests/pcap
various PCAPs for testing as provided by Moloch
- https://www.unb.ca/cic/datasets/index.html
- https://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html
The new link appears to be (as of 2019-09-19) https://www.dropbox.com/sh/7fo4efxhpenexqp/AACmuri_l-LDiVDUDJ3hVLqPa?dl=0 - https://giantpanda.gtisc.gatech.edu/malrec/dataset/
dataset of 66,301 malware recordings collected over a two-year period. Include things such as, but not limited to, antivirus labels for each sample/pcap from Virustotal.
- https://didierstevens.com/files/data/heartbleed_packet_capture.zip
- https://github.com/401trg/detections/tree/master/pcaps
More at the root repo https://github.com/401trg/detections
- https://data.mendeley.com/datasets/zh3wnddzxy/1
Campus DNS network traffic consisting of more than 4000 active users (in peak load hours) for 10 random days in the month of April-May, 2016 is available in hourly PCAP files in the dataset. (At present only traffic for Day0(Full) and Day1(partial) could be uploaded due to 10GB data limit)
- https://weberblog.net/the-ultimate-pcap/
single pcap meant to be a single point of source for Wireshark samples. It is summarizing *all* previous ones from my blog and even adding some more protocols and details. I will constantly add more packets to this pcap if I have some. Currently, it has > 50 different protocols and hundreds of variants, such as IPv6 and legacy IP traffic, different DNS query types, ICMP error codes, and so on.
- https://github.com/zeek/zeek/tree/master/testing/btest/Traces
various PCAPs for testing as provided by Zeek
- https://github.com/FiveDirections/OpTC-data
Zeek data and flow data provided by a simulation by Darpa. Download link of data is here: https://drive.google.com/drive/u/0/folders/1n3kkS3KR31KUegn42yk3-e6JkZvf0Caa
- https://github.com/sbousseaden/PCAP-ATTACK
PCAP captures mapped to the relevant MITRE ATT&CK tactic.
- https://github.com/OTRF/detection-hackathon-apt29/tree/master/datasets/day1/pcaps
APT 29 (Day 1) Simulation by @OTRF Community
- https://github.com/OTRF/detection-hackathon-apt29/tree/master/datasets/day2/pcaps
APT 29 (Day 2) Simulation by @OTRF Community