Pentest Lab Logo

Pentest Lab

0
Free
Visit Website

This local pentest lab leverages docker compose to spin up multiple victim services and an attacker service running Kali Linux. If you run this lab for the first time it will take some time to download all the different docker images. Executed commands: - ./lab.sh --help - ./lab.sh --check-dependencies - ./lab.sh --up --all-services - ./lab.sh --info - ./lab.sh --overview all - ssh root@kali -o "UserKnownHostsFile /dev/null" - ./lab.sh --down Usage: The lab should work out of the box if all needed dependencies are installed. At startup, the lab will run a dependency check. Start the lab: - git clone https://github.com/oliverwiegers/pentest_lab - cd pentest_lab - ./lab.sh -u By default, the lab will start all victim services and one red team service. Other services can be started and added. More information on this down on this below. For further usage information, consider reading the help message shown by ./lab.sh -h | --help. Dependencies: - bash - find - sed - yq (The Python version. Not yq-go.) - docker - docker-compose The lab has a built-in dependency check which runs.

FEATURES

ALTERNATIVES

Online Telegram bot for collecting information on individuals from various websites.

A PoC tool for generating Excel files with embedded macros without using Excel.

A Python script for creating a cohesive and up-to-date penetration testing framework.

A blog post discussing the often overlooked dangers of CSV injection in applications.

An open-source intelligence collection, research, and artifact management tool inspired by SpiderFoot, Harpoon, and DataSploit.

RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.

A reminder that technology alone is not enough to stay secure against social engineering tactics.

A tool for detecting and taking over subdomains with dead DNS records

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved