Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Cyber Range Training

Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.

Explore 77 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
SimSpace Platform Logo

SimSpace Platform is a cyber range solution that provides realistic environments for cybersecurity training, testing, and optimization of security capabilities.

0
awesome-vulnerable-apps Logo

A list of vulnerable applications for testing and learning

0
Purple Academy by Picus Logo

Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

0
pwnable.kr Logo

A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.

0
Krypton Logo

A wargame designed to test your hacking skills and knowledge

0
InsecureShop Logo

InsecureShop is an intentionally vulnerable Android application built in Kotlin for educating developers and security professionals about mobile app vulnerabilities and penetration testing techniques.

0
MotherFucking CTF Logo

A lightweight CTF platform with simple setup and difficulty-based scoring that removes timezone advantages from competitions.

0
WebGoat Logo

WebGoat is an OWASP-maintained deliberately insecure web application designed to teach web application security through hands-on exercises with intentional vulnerabilities.

0
Pentest Lab Logo

Local pentest lab using docker compose to spin up victim and attacker services.

2
LFI-Labs Logo

A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.

0
Boss of the SOC (BOTS) Dataset Version 2 Logo

A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.

0
echoCTF Logo

echoCTF is a cybersecurity framework for running Capture the Flag competitions and training exercises on real IT infrastructure.

0
Webhacking.kr Logo

Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

0
Kubernetes Goat Logo

Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.

0
Ranges – Cyber Warfare Range LLC Logo

A network of physical and online cyber warfare ranges for training and testing

0
OWASP Juice Shop CTF Extension Logo

A Node.js CLI tool that automates the setup of CTF events using OWASP Juice Shop challenges across multiple CTF frameworks.

0
Hack This Site Logo

A free, safe, and legal training ground for ethical hackers to test and expand their skills

0
Synthetic Adversarial Log Objects (SALO) Logo

SALO is a framework that generates synthetic log events for security testing and research without requiring actual infrastructure or triggering real events.

0
OverTheWire: Vortex Logo

A wargame composed of 27 levels, with files needed in /vortex/ directory.

0
NightShade Logo

NightShade is a Django-based capture the flag framework that enables organizations to create and manage cybersecurity competitions with support for multiple contest formats and multi-tenant architecture.

0
Labs-Pentest Logo

A comprehensive collection of free online laboratories and platforms for practicing penetration testing, CTF challenges, and cybersecurity skills development.

0
Ghost in the Shellcode Logo

An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.

0
Detection Lab Logo

DetectionLab is a pre-configured Windows domain environment with security tooling and logging designed for cybersecurity training and detection capability development.

0
Java Vulnerable Logo

A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.

0

Cyber Range Training Tools - FAQ

Common questions about Cyber Range Training tools including selection guides, pricing, and comparisons.

Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.

Have more questions? Browse our categories or search for specific tools.