This collection complements the Padding Attacks benchmark datasets serves as a valuable benchmark training set for multi-class classification tasks or detecting information leakage via error code or time delay in the network traces collected from vulnerable OpenSSL TLS servers. For detailed inclusion criteria, refer to the paper available at https://arxiv.org/pdf/2401.14283.pdf. If you utilize this work in your publication, kindly cite the appropriate reference.